Cliente de Spotify para Debian 9

Comandos:

Instalamos:

apt-get install dirmngr

Agregamos la llave para el repositorio:

apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 4773BD5E130D1D45

Agregamos el repositorio:

echo deb http://repository.spotify.com stable non-free | sudo tee /etc/apt/sources.list.d/spotify.list

Actualizamos:

apt-get update

Instalamos Spotify:

apt-get install spotify-client

mod_security en Debian

, ,

Comandos:

Instalamos:

apt install libapache2-modsecurity

Reiniciamos:

/etc/init.d/apache2 restart

Copiamos configuración por defecto:

cp /etc/modsecurity/modsecurity.conf-recommended /etc/modsecurity/modsecurity.conf

Editamos:

vi /etc/modsecurity/modsecurity.conf

Buscamos:

SecRuleEngine DetectionOnly

Modificamos:

SecRuleEngine on

Reiniciamos:

/etc/init.d/apache2 restart

Clonado de soportes con DD

Comandos:

Unidades

dd status=progress if=origen of=/dev/destino bs=1M

ISO

dd status=progress if=origen.iso of=/dev/destino

 

Bases de datos MariaDB

Comandos:

apt-get -y install mariadb-server mariadb-client
mysql_secure_installation

NOTE: RUNNING ALL PARTS OF THIS SCRIPT IS RECOMMENDED FOR ALL MariaDB
SERVERS IN PRODUCTION USE! PLEASE READ EACH STEP CAREFULLY!

In order to log into MariaDB to secure it, we’ll need the current
password for the root user. If you’ve just installed MariaDB, and
you haven’t set the root password yet, the password will be blank,
so you should just press enter here.

Enter current password for root (enter for none): Pulsa ENTER

OK, successfully used password, moving on…

Setting the root password ensures that nobody can log into the MariaDB
root user without the proper authorisation.

Set root password? [Y/n]  Y

New password: Contraseña para root en MariaDB
Re-enter new password: Repetimos contraseña para root en MariaDB

… Success!

By default, a MariaDB installation has an anonymous user, allowing anyone
to log into MariaDB without having to have a user account created for
them. This is intended only for testing, and to make the installation
go a bit smoother. You should remove them before moving into a
production environment.

Remove anonymous users? [Y/n] Y

… Success!

Normally, root should only be allowed to connect from ‘localhost’. This
ensures that someone cannot guess at the root password from the network.

Disallow root login remotely? [Y/n] Y

… Success!

By default, MariaDB comes with a database named ‘test’ that anyone can
access. This is also intended only for testing, and should be removed
before moving into a production environment.

Remove test database and access to it? [Y/n]  Y

– Dropping test database…
… Success!
– Removing privileges on test database…
… Success!

Reloading the privilege tables will ensure that all changes made so far
will take effect immediately.

Reload privilege tables now? [Y/n] Y

… Success!

Cleaning up…

All done! If you’ve completed all of the above steps, your MariaDB
installation should now be secure.

Thanks for using MariaDB!

Con esto ya tenemos nuestro servidor de bases de datos MariaDB instalada y funcionando.

Instalamos soporte para PHP:

apt-get -y install php7.0-mysql php7.0-curl php7.0-gd php7.0-intl php-pear php-imagick php7.0-imap php7.0-mcrypt php-memcache php7.0-pspell php7.0-recode php7.0-sqlite3 php7.0-tidy php7.0-xmlrpc php7.0-xsl

 

Comprimir y descomprimir con comandos

,

Comandos:

Tar

Comprimir

tar -cvf archivo.tar /directorio

Descomprimir

tar -xvf archivo.tar

Gz

Comprimir

gzip -9 fichero

Descomprimir

gzip -d fichero.gz

Bz2

Comprimir

bzip fichero

Descomprimir

bzip2 -d fichero.bz2

Tar.gz

Comprimir

tar -czfv archivo.tar.gz ficheros

Descomprimir

tar -xzvf archivo.tar.gz

Tar.bz2

Comprimir

tar -c ficheros | bzip2 > archivo.tar.bz2

Descomprimir

bzip2 -dc archivo.tar.bz2 | tar -xv

Zip

Comprimir

zip -r archivo.zip directorio

Descomprimir

unzip archivo.zip

Rar

Comprimir

rar -a archivo.rar ficheros

Descomprimir

unrar -x archivo.rar

 

Comprobar versión Linux

,

Comandos:

Distribución:

lsb_release -a
Kernel:
uname -a

MalDet en Debian

,

Comandos:

Entramos al directorio temporal:

cd /tmp/

Descargamos MalDet:

curl -O http://www.rfxn.com/downloads/maldetect-current.tar.gz

Descomprimimos:

tar xvzf maldetect-current.tar.gz

Accedemos al directorio:

cd maldetect-1.6.4

Ejecutamos:

bash install.sh

Ahora lo configuramos, editamos:

vi /usr/local/maldetect/conf.maldet

Configuramos lo siguiente:

email_alert=»1″

email_addr=»you@domain.com»

scan_clamscan=»1″

scan_ignore_root=»0″

quarantine_hits=»1″

quarantine_clean=»1″

quarantine_suspend_user=»1″

quarantine_suspend_user_minuid=»500″

Usando MalDet:

maldet -a /directorio a escanear

Actualizar  MalDet:

maldet -d

Actualizar DB:

maldet -u

Automatizar cada día a las 11 de la noche:

crontab -e

0 23 * * * echo 3 > maldet -a /

Optimiza Apache con mod_expires

,

Comandos:

Activar modulo:

a2enmod expires

Editar fichero de configuración:

vi /etc/apache2/mods-available/expires.conf

Añadir:

<IfModule mod_expires.c>
ExpiresActive on
ExpiresByType image/jpg "access plus 30 days"
ExpiresByType image/png "access plus 30 days"
ExpiresByType image/gif "access plus 30 days"
ExpiresByType image/jpeg "access plus 30 days"
ExpiresByType text/css "access plus 1 days"
ExpiresByType image/svg+xml "access plus 30 days"
ExpiresByType image/x-icon "access plus 60 days"
ExpiresByType application/pdf "access plus 2 days"
ExpiresByType text/javascript "access plus 12 hours"
ExpiresByType application/x-javascript "access plus 12 hours"
ExpiresByType application/javascript "access plus 12 hours"
</IfModule>

Reiniciar:

/etc/init.d/apache2 restart

Cambiar tamaño memoria SWAP

,

Si por cualquier motivo tu Linux va falto de memoria SWAP podemos cambiar su tamaño editando este fichero:

sudo nano /etc/dphys-swapfile

Buscar la siguiente variable:

CONF_SWAPSIZE=100

Y modificar su tamaño:

CONF_SWAPSIZE=512

Reiniciamos y listo:

sudo reboot