How to impersonate another Linux user using SUDO
sudo -i -u mary You need to use the -i (login) option. Reference https://www.howtogeek.com/447906/how-to-control-sudo-access-on-linux
sudo -i -u mary You need to use the -i (login) option. Reference https://www.howtogeek.com/447906/how-to-control-sudo-access-on-linux
Whilst trying to renew a Let’s Encrypt certificate on an older CentOS server, you might experience the following: Cert is due for renewal, auto-renewing… Starting
There are technical ways to look at any website and email to determine what the actual links are. Phishers are sophisticated criminals and try to
chkrootkit is a tool that’s used to determine if a Unix server has been compromised. You can’t do yum install chkrootkit on CentOS so follow
Background On some Virtualmin server you may find that Fail2ban is logging events, but soon realize that due to the amount of “already banned” messages
What is iptables? iptables is a powerful firewall utility for Linux that is often included with the operating system. Behind the scenes many firewalls also
Background Fail2ban is a really powerful utility and can help you out of a bind. The problem is the syntax – it’s changed and when
At times on a Linux server you want to switch to another user. One example could be one a shared server whereby you need to
This article explains how to create RSA public and private key pairs in PKCS#8 format. This might be required if an upstream supplier asks
Background On a newly installed Virtualmin server you might see events complaining about a missing config file for filter.d/sshd-ddos as per below: Jul 13 19:57:35