top of page
Search


Advanced Intrusion Detection Environment (AIDE) on RHEL / Rocky / CentOS
System integrity is one of the most overlooked areas in Linux security. Firewalls, SELinux, and antivirus tools are common, but they do not tell you if critical system files were modified silently . This is where AIDE (Advanced Intrusion Detection Environment) fits perfectly. In this blog, I’ll walk through what AIDE is, how it works, how to configure it properly , and how to interpret its output on RHEL, Rocky Linux, and CentOS . All commands shown below were executed manu

Siddhesh Kadam
3 min read


Understanding and Managing ARP Cache in Linux: A Complete Technical Guide
Managing the ARP cache effectively is essential for maintaining smooth network communication on Linux systems. Both Red Hat Enterprise Linux (RHEL) and Rocky Linux rely on the Address Resolution Protocol (ARP) to map IP addresses to MAC addresses within a local network. Understanding how to view, modify, and clear the ARP cache can help troubleshoot network issues, improve security, and optimize system performance. This post explores ARP cache management on RHEL and Rocky Lin

Siddhesh Kadam
4 min read


Maximizing Security: A Step-by-Step Guide to Enabling Audit Logs on Linux
Introduction of Auditd Keeping track of what happens on your Linux system is crucial, especially for security and compliance. Linux...

Siddhesh Kadam
3 min read


Socket Statistics in Linux Using (ss)
If you’ve ever needed to troubleshoot network connections on a Linux system, you’ve likely encountered tools like netstat . But there’s a...

Siddhesh Kadam
2 min read


Monitoring Disk-Level Changes in Real-Time Using inotifywait
Monitoring file system activity in real-time is crucial for system administrators, developers, and DevOps engineers. Whether you’re...

Siddhesh Kadam
2 min read


Creating Multiple Postfix Instances with Postmulti
Postfix is a popular mail transfer agent (MTA) used to route and deliver email on Linux servers. Sometimes, it’s necessary to run...

Siddhesh Kadam
2 min read


How to Create a Customized Log Format with Rsyslog
Logging is a critical aspect of system administration, helping you keep track of events, diagnose issues, and maintain security. While...

Siddhesh Kadam
3 min read


Restricting Access in Nginx: How to Block Unwanted Traffic
When managing a web server, it's essential to protect your site from unwanted traffic and malicious activity. Nginx, a popular web...

Siddhesh Kadam
2 min read


How to Hide the Server Name in Nginx Using the Headers More Module
When running a web server, security and privacy are key considerations. By default, Nginx reveals its server name in the HTTP headers,...

Siddhesh Kadam
2 min read


Installing Nginx from Source on a Linux System (RHEL9/Rocky9)
In this blog, I'll guide you through installing Nginx from source on a Linux system. We'll walk through each step, from installing the...

Siddhesh Kadam
2 min read


Exploring the Steps to Activate Debug Mode in Nginx
Debugging is an essential part of maintaining and optimizing your NGINX server. It provides detailed logs that can help you troubleshoot...

Siddhesh Kadam
2 min read


Type Of Load Balancers Algorithms
Load balancing can be generally divided into two main types: static and dynamic , each with different methods and applications. Static...

Siddhesh Kadam
3 min read


Configuring Nginx with Multiple Server Blocks
Nginx is a powerful, flexible web server and reverse proxy server used to serve static content, manage HTTP requests, and balance loads...

Siddhesh Kadam
2 min read


How to Run the LLama3 Model with Ollama in a Docker Container
What is LLama ? In simple terms, LLaMA (Large Language Model Meta AI) is a powerful computer program developed by Meta (the company...

Siddhesh Kadam
2 min read


How to Setup PHP on Nginx with FastCGI (PHP-FPM)
Nginx and PHP-FPM (PHP FastCGI Process Manager) work together to serve dynamic web content efficiently. Here's an overview of how they...

Siddhesh Kadam
3 min read


Network Teaming/Bonding Mode
Teaming or bonding modes are configurations used primarily in networking to provide redundancy and increase throughput by combining...

Siddhesh Kadam
1 min read


A Comparison of RHEL7, RHEL8, and RHEL9
Red Hat Enterprise Linux (RHEL) has undergone significant transformations from version 7 to versions 8 and 9, reflecting the evolving...

Siddhesh Kadam
3 min read


Chronyd: The Replacement for NTP in Rocky9/RHEL9
The chronyd service is a modern replacement for the ntpd (Network Time Protocol daemon) service in many Linux distributions. While ntpd...

Siddhesh Kadam
9 min read


Step-by-Step Guide: Changing the Default Port for cockpit.service in RHEL9/Rocky9
Introduction: Cockpit is a powerful web-based interface that simplifies server management tasks on Linux systems. By default, Cockpit...

Siddhesh Kadam
2 min read


How to verify the installation of an Ansible collection?
Ansible collections are a powerful way to organize and distribute Ansible content such as playbooks, roles, modules, and plugins....

Siddhesh Kadam
3 min read
bottom of page
