<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Ubuntu23.04_en | Linux Server Construction</title>
	<atom:link href="https://korodes.com/en/category/ubuntu23_en/feed/" rel="self" type="application/rss+xml" />
	<link>https://korodes.com</link>
	<description></description>
	<lastBuildDate>Thu, 06 Mar 2025 04:52:30 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://korodes.com/wp-content/uploads/2020/01/cropped-profile-32x32.jpg</url>
	<title>Ubuntu23.04_en | Linux Server Construction</title>
	<link>https://korodes.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Ubuntu Server23.04 : System Backup &#038; Restore</title>
		<link>https://korodes.com/en/ubuntu23-en_12/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Mon, 09 Oct 2023 03:52:55 +0000</pubDate>
				<category><![CDATA[Ubuntu23.04_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=20114</guid>

					<description><![CDATA[1. System Backup

1.1 Backup under /var/www/html

①Create /var/www/system directory
1.2 MariaDB database backup

①Create db_backup.sh script under /var/www/system
2. System Restore

2.1 Restore backup files under HTML

①Store HTML backup files used for backup in the "/ (root)" directory
Select the backup file with the latest timestamp
(Example: www_back_20231009.tar.gz)
2.2 Restore MariaDB database

①Save DB backup file to any directory and decompress data]]></description>
		
		
		
			</item>
		<item>
		<title>Ubuntu Server23.04 : disk usage check script , Logwatch</title>
		<link>https://korodes.com/en/ubuntu23-en_11/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Mon, 09 Oct 2023 02:02:08 +0000</pubDate>
				<category><![CDATA[Ubuntu23.04_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=20107</guid>

					<description><![CDATA[1. Introduce disk usage check script

1.1 Script Creation
2. Log analysis tool Logwatch installed

2.1 Install logwatch]]></description>
		
		
		
			</item>
		<item>
		<title>Ubuntu Server23.04 : SNORT2 , Tripwire</title>
		<link>https://korodes.com/en/ubuntu23-en_10/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Sat, 07 Oct 2023 03:43:59 +0000</pubDate>
				<category><![CDATA[Ubuntu23.04_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=20096</guid>

					<description><![CDATA[1.SNORT2 Install

Snort is an open source network intrusion detection system that can perform real-time traffic analysis and packet logging on IP networks.

It can perform "protocol analysis," "content search," and "matching," and can be used to detect a variety of attacks, including buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, semantic URL attacks, and server message block probes. The SNORT3 can be used to detect a wide variety of attacks, including

To install SNORT3, see
2.Tripwire Install

Implement a system to detect file tampering on Linux servers by crackers.
This time, Tripwire, a host-based IDS (IDS=Intrusion Detection System), will be installed as the file tampering detection system.
Tripwire detects file additions/changes/deletions by creating a database of file status at the time of installation and comparing the database with the current status of the file.]]></description>
		
		
		
			</item>
		<item>
		<title>Ubuntu 22.04 &#038;  23.04 Server : SNORT3 Install</title>
		<link>https://korodes.com/en/ubuntu22-23_en_snort3/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Sat, 07 Oct 2023 02:55:44 +0000</pubDate>
				<category><![CDATA[Ubuntu22.04_en]]></category>
		<category><![CDATA[Ubuntu23.04_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=19889</guid>

					<description><![CDATA[Snort3 Install

The default universe repository for Ubuntu22.04,23.04 is snort2.9 as shown below, so build, compile and install Snort3 from the source code]]></description>
		
		
		
			</item>
		<item>
		<title>Ubuntu Server23.04 : MariaDB , WordPress Install</title>
		<link>https://korodes.com/en/ubuntu23-en_09/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Thu, 05 Oct 2023 04:53:45 +0000</pubDate>
				<category><![CDATA[Ubuntu23.04_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=20082</guid>

					<description><![CDATA[1. MariaDB Install

1. 1Install
1.2. MariaDB Server Security Settings

Run the tool mysql_secure_installation to configure security-related settings for the MariaDB server.
Once executed, the tool will start several security settings in the form of questions. First, you will be asked if you want to use a plugin for password validation, as shown below.
Password validation is a plugin that checks the strength of a user's password for MariaDB and restricts it to accepting only passwords that are secure enough. For example, it must be at least as many characters long as the user's password and must contain at least one symbol and one number. You can set this requirement by asking the following question
Type y and press Enter if you like
2.WordPress Install

2.1 Create database]]></description>
		
		
		
			</item>
		<item>
		<title>Ubuntu Server23.04 : Web server, Mail server SSL conversion (Let&#039;s Encrypt)</title>
		<link>https://korodes.com/en/ubuntu23-en_08/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Wed, 04 Oct 2023 23:35:31 +0000</pubDate>
				<category><![CDATA[Ubuntu23.04_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=20077</guid>

					<description><![CDATA[1.Obtain a certificate (Let's Encrypt)

1.1 advance preparation

1.Enable mod_ssl
2.Package management system Snappy installed
Let's Encrypt's SSL certificate issuing tool "certbot" is recommended to be installed using "snap" after 2021, so install Snapd first. (It can also be installed using the conventional method with dnf or yum)
1.3 Obtain a Let's Encrypt Certificate

It is assumed that a web server such as Apache httpd or Nginx is running.
If the web server is not running on the server where the work is to be performed, follow the procedure below under "Obtaining a Let's Encrypt certificate when the web server is not running".
It is also assumed that the server on which the work is to be performed (the server with the FQDN of the server from which you want to obtain the certificate) is accessible from the Internet at port 80.
2. SSL/TLS (Let's Encrypt) configuration for Apache2

①Edit Apache2 SSL-related configuration files
3. SSL/TLS (Let's Encrypt) settings on the mail server

3.1 Obtaining a certificate for the mail server

Obtain a certificate for the mail server, but it cannot be obtained in the same way as above, so the following with the "--standalone" option fails.]]></description>
		
		
		
			</item>
		<item>
		<title>Ubuntu Server23.04 : Anti-Virus(Clamav) , Mail Server</title>
		<link>https://korodes.com/en/ubuntu23-en_07/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Tue, 03 Oct 2023 06:13:51 +0000</pubDate>
				<category><![CDATA[Ubuntu23.04_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=20069</guid>

					<description><![CDATA[1.Anti-virus software Clamav installed

1.1 Install

# apt install clamav clamav-daemon

The clamav-related configuration files are installed in the "/etc/clamav/" folder.
2. Email software installation

2.1 Postfix : Installation/Configuration

Install Postfix and build an SMTP server. 25/TCP is used for SMTP.
To prevent unauthorized mail relay, use the SASL function of Dovecot (see below), and configure Postfix so that authentication is required even for outgoing mail.
2.2 Dovecot : Installation/Configuration

Install Dovecot and build a POP/IMAP server, using 110/TCP for POP and 143/TCP for IMAP
2.7 Applied ClamAV to mail server Postfix

Set up Postfix and Clamav to work together to scan incoming and outgoing mail in real time.

①Install Amavisd and Clamav Daemon and start Clamav Daemon
2.7 Applied ClamAV to mail server Postfix

Set up Postfix and Clamav to work together to scan incoming and outgoing mail in real time.

①Install Amavisd and Clamav Daemon and start Clamav Daemon
2.7 Applied ClamAV to mail server Postfix

Set up Postfix and Clamav to work together to scan incoming and outgoing mail in real time.

①Install Amavisd and Clamav Daemon and start Clamav Daemon
2.8Applied spamassassin to mail server Postfix

2.5.1 spamassassin install

①Install]]></description>
		
		
		
			</item>
		<item>
		<title>Ubuntu Server23.04 : WEB Server(Apache)</title>
		<link>https://korodes.com/en/ubuntu23-en_06/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Mon, 02 Oct 2023 05:42:17 +0000</pubDate>
				<category><![CDATA[Ubuntu23.04_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=20059</guid>

					<description><![CDATA[Apache2 Install

Allow http:80 port and https:443 port in UFW first.
3 Apache2 : Using Perl Scripts

Enable CGI to make Perl scripts available
①Perl  Install
4 Apache2 : Using PHP Scripts

①PHP Install
5 Apache2 : Virtual Host Settings

①Copy the default configuration file (file name is arbitrary, in this case vhost-yourdomain.conf as an example) and configure the virtual host
6. Digest authentication with Apache2

Since Basic Authentication, a well-known authentication authentication method for http, transmits authentication information in plain text, there is a risk of ID and password leakage if the packet is intercepted.
On the other hand, Digest Authentication encrypts the authentication information and sends it in encrypted form, so there is almost no risk of information leakage.]]></description>
		
		
		
			</item>
		<item>
		<title>Ubuntu Server23.04 : NTP , FTP(Vsftpd) , Samba Install</title>
		<link>https://korodes.com/en/ubuntu23-en_05/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Mon, 02 Oct 2023 00:14:54 +0000</pubDate>
				<category><![CDATA[Ubuntu23.04_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=20050</guid>

					<description><![CDATA[1.Install NTP server
2. Install FTP server vsftpd

2.1Installation and configuration

①Install
2.2 Vsftpd Over SSL/TLS

①Create a self-signed certificate.
If you are using a trusted, legitimate certificate such as Let's Encrypt, you do not need to do this work.
3. File server installation with Samba

Build a file server with access rights that requires user authentication with Samba.
Installation Procedure
(1) Create a shared folder with access rights that requires user authentication.
(2) Create a group with access rights
(3)Create users belonging to groups that can be accessed
(4)Edit configuration file]]></description>
		
		
		
			</item>
		<item>
		<title>Ubuntu Server23.04 : SSH connection with public key cryptography</title>
		<link>https://korodes.com/en/ubuntu23-en_04/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Sun, 01 Oct 2023 05:37:09 +0000</pubDate>
				<category><![CDATA[Ubuntu23.04_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=20038</guid>

					<description><![CDATA[SSH connection with authentication using public key cryptography

 Creation of public and private key pairs

Create a public/private key pair for a user connecting to the Linux server using OpenSSH.
Use ssh-keygen to create key pairs.
This time, we will create a key set using the RSA cipher used in the SSH protocol Version 2.
Creation of public/private key pairs is performed with remote login user privileges (huong).
If you do not specify the destination and file name, id_ed25519,id_ed25519.pub will be created in /home/huong/.ssh/. On the way, enter the password for the key.]]></description>
		
		
		
			</item>
	</channel>
</rss>
