Linux port forwarding is simple to do with iptables which may probably already being used as the firewall or part of the setting up a Linux gateway. In the Linux kernel, port forwarding is achieved by packet filter rules in iptables. Port forwarding Port forwarding also called “port mapping” commonly refers to the network address
Read more
Tag: Security
How to Set Up Password-less SSH Login on Linux
Posted onAutomatic passwrod-less ssh login can make our life easier. To enable this, we have 2 options: using key-based authentication by copying our SSH public keys to the remote machines for automatic password-less login or using password-based authentication. I will introduce the 2 options in the post. Before you start, please note that key-based authentication is
Read more
Sending Email Using mailx/s-nail in Linux Through Gmail SMTP
Posted onThe heirloom mailx (or s-nail if you are using Ubuntu 18 or later or similar releases) command in Linux is still providing service for guys like me, especially when we need to send email automatically by script. Gmail is great. Now, how to use gmail’s smtp in mailx/mail? gmail is a little special since gmail’s
Read more
Setting Up Linux Network Gateway Using iptables and route
Posted onSharing the networking is important and setting up a gateway is a good solution to it. Building up the gateway on a Linux box is easy, cost efficient and reliable. With a Linux box, you can share the internet connection or the only cable connected to the network. The Linux box network configuration The Linux
Read more
How to Control or Disable SELinux in Fedora and CentOS Linux
Posted onFor most of cases, you should not disable SELinux. However, for some users, SELinux may cause problems or is not needed. We may just make it not block operations or totally disable it. Making SELinux log warnings instead of blocking For many cases, people find SELinux blocks operations. For tests or some other situations, you
Read more
How to Set Up Socks Proxy Using SSH Tunnel
Posted onWe can set up a socks proxy on top of a SSH tunnel. Besides the common proxy functions, such as web browsing, the proxy on top of SSH tunnel also ensures the security between the browser and the proxy server (the SSH server). In this post, we introduce and explain how to set up a
Read more
How to Duplicate Xen DomU Virtual Machines
Posted onAssumption: There are VBD based Xen DomU virtual machines stored under /home/xen/vm-f11-sample/. There are two files under vm-f11-sample: vm0-f11.run (The configuration file) and vmdisk0 (The virtual disk). Now we want to duplicate the virtual machine vm0 stored under vm-f11-sample to vm-10.0.0.213 which is stored under vm-10.0.0.213. And vm-10.0.0.213’s ip will be 10.0.0.213. The steps to
Read more
Configure sMobileNet of HKUST on Linux
Posted onHow to configure NetworkManager to connect to sMobileNet in HKUST is introduced in this post. The wireless network connection configuration for sMobileNet in NetworkManager The SSID is “sMobileNet” Wireless security is “WPA & WPA2 Enterprise” Authentication is “Protected EAP (PEAP)” Anonymous identity is “” (empty) CA certificate is “(None)” (there will be a warning appear,
Read more
Conference Ranking by Average Number of Citations in the Last 5 Years, 2012
Posted onI am trying to find out the top conferences that have the largest average number of citations in the last 5 years on the Internet but fail to find one. However, there are many rankings about the overall citations and numbers of publications. Hence, it is not hard to calculate the average number of citations
Read more
Conferences on Cloud Computing 2013
Posted onThis post lists important conferences related to Cloud Computing in year 2013. SOSP 2013 SOSP’13: The 24th ACM Symposium on Operating Systems Principles. November 3-6, 2013, Nemacolin Woodlands Resort, Pennsylvania. The biennial ACM Symposium on Operating Systems Principles is the world’s premier forum for researchers, developers, programmers, and teachers of computer systems technology. Academic and
Read more