Dimas Maulana

Dimas Maulana

Developer

Welcome to my website! I am a developer with a current focus on React and Go. My experience encompasses both front-end and back-end development, enabling me to design and develop seamless and efficient applications.

Long Waiting Up for 60 Second Network

If you want to modify the /etc/init/failsafe.conf file to reduce the waiting time for the network to come up during system startup. Specifically, you want to remove the sleep 40 and sleep 50 commands from the network waiting section. Here’s how you can do it:

Note: Modifying system configuration files can have unintended consequences and may impact the stability and functionality of your system. Please make sure you have a backup of the original file and proceed with caution.

Troubleshooting Virtual Network Failure on Verbose Boot

If you’re encountering a virtual network failure during a verbose boot, where you see detailed messages about the networking initialization process, you may need to take specific actions to resolve the issue. One possible solution is to remove or rename the /etc/init/networking.conf file. Here’s a step-by-step guide on how to do this:

Note: Before proceeding, make sure you have administrative privileges on your system.

Step 1: Access the Command Line

You’ll need to access the command line interface of your system to perform these actions. You can usually do this by opening a terminal or console window. If you’re already logged in, proceed to the next step.

Automate SSH Login Notification via Email

You can enhance your system’s security by setting up an automated email notification whenever someone logs in via SSH. This can help you stay informed about unauthorized access to your system. Below is a guide on how to implement this feature.

Note: This guide assumes you have administrative access to your system and are familiar with basic Linux commands.

1. Edit /etc/profile

First, open the /etc/profile file in a text editor as the root user:

How to Connect to MySQL via SSH Tunnel in Linux

When you need to connect to a MySQL server from outside your local network, using an SSH tunnel can provide a secure and convenient method for access. In this guide, we will walk you through the steps to connect to a MySQL server via SSH tunnel on a Linux system. This method can be particularly useful if you are trying to access a remote MySQL server hosted by a service provider like Quintagroup.

SSH Tunneling Made Easy

By Frank Wiles

Setting up a simple SSH tunnel can be incredibly useful, yet finding a straightforward guide can be surprisingly challenging. In this Quick-Tip, I’ll walk you through the process using OpenSSH on a Linux/Unix system. With SSH tunneling, you can securely route all your local traffic through a remote server where you have an account.

One common use case for SSH tunneling is redirecting outbound email traffic to a personal server. This can help you avoid the hassle of changing SMTP servers, dealing with SMTP-AUTH, and other complications when you’re behind firewalls. Hotel firewalls, wireless access points, and various NATing devices you encounter while traveling don’t always cooperate. Here’s how to do it:

SSH Two Factor Authentication With Google Authenticator

In the past, setting up true two-factor authentication (2FA) for SSH access has been a bit of a challenge. However, with the release of OpenSSH 6.2, full and proper support for 2FA is now available. This article explains how to set up SSH 2FA using Google Authenticator on Ubuntu, which greatly enhances the security of your SSH access.

Quick Start

To get started, follow these steps:

0%