Will ‘Htop’ Replace Default ‘Top’ Monitoring Tool in Linux?

Full Article : Tecmint – https://www.tecmint.com/htop-vs-top-in-linux/ top is a traditional command-line tool for monitoring real-time processes in a Unix/Linux systems, it’s comes preinstalled on most if not all Linux distributions and shows a useful summary … Read more

LibreNMS – A Fully Featured Network Monitoring Tool for Linux

Full Article : Tecmint – https://www.tecmint.com/install-librenms-monitoring-on-ubuntu-centos/ LibreNMS is an open source, powerful and feature-rich auto-discovering PHP based network monitoring system which uses the SNMP protocol. It supports a broad range of operating systems including Linux, … Read more

Mytop – A Useful Tool for Monitoring MySQL/MariaDB Performance in Linux

Full Article : Tecmint – https://www.tecmint.com/mytop-mysql-mariadb-database-performance-monitoring-in-linux/ Mytop is an open source and free monitoring program for MySQL and MariaDB databases was written by Jeremy Zawodny using Perl language. It is much similar in look and … Read more

CloudFlair – Find Origin Servers Of Websites Protected By CloudFlare

Full Article : OSTechNix – https://www.ostechnix.com/cloudflair-find-origin-servers-websites-protected-cloudflare/ Cloudflare is one of the popular web performance and security company that offers CDN, DNS, DDoS protection and security for millions of websites. It acts as a middle man … Read more

How to Install Tripwire IDS (Intrusion Detection System) on Linux

Full Article : Tecmint – https://www.tecmint.com/install-tripwire-ids-intrusion-detection-system-on-linux/ Tripwire is a popular Linux Intrusion Detection System (IDS) that runs on systems in order to detect if unauthorized filesystem changes occurred over time. In CentOS and RHEL distributions, … Read more

How to Check Integrity of File and Directory Using “AIDE” in Linux

Full Article : Tecmint – https://www.tecmint.com/check-integrity-of-file-and-directory-using-aide-in-linux/ In our mega guide to hardening and securing CentOS 7, under the section “protect system internally”, one of the useful security tools we listed for internal system protection against … Read more