1. We shall connect to the server computer (running Ubuntu) and then install the required package with command sequence 'sudo apt-get update && sudo apt-get install -y install sysstat'
1. We shall connect to the server computer (running Ubuntu) and then install the required package with command sequence 'sudo apt-get update && sudo apt-get install -y install sysstat'
2. Run [shell-based sysstat script](https://github.com/Fincer-altego/basics-of-a-linux-server-school-course-/blob/master/sysstat_command.sh) which runs sar and pidstat commands two days with 20 second intervals.
2. Run [shell-based sysstat script](https://github.com/Fincer/linux_server_setup/blob/master/scripts/sysstat_command.sh) which runs sar and pidstat commands two days with 20 second intervals.
**NOTE!** The script could have been opmitized more for the real requirements for the server environment (statistics interval, collection period, etc.)
**NOTE!** The script could have been opmitized more for the real requirements for the server environment (statistics interval, collection period, etc.)
@ -1910,7 +1910,7 @@ More about Port Knocking technique:
Program [arp-scan](https://www.blackmoreops.com/2015/12/31/use-arp-scan-to-find-hidden-devices-in-your-network/) can be used in limited scale to scan a MAC address (OSI model layer 2, Data Link Layer) in a network.
Program [arp-scan](https://www.blackmoreops.com/2015/12/31/use-arp-scan-to-find-hidden-devices-in-your-network/) can be used in limited scale to scan a MAC address (OSI model layer 2, Data Link Layer) in a network.
Unique MAC address of a network interface (network card) can programmatically be spoofed with [these Arch Wiki instructions](https://wiki.archlinux.org/index.php/MAC_address_spoofing#Method_1:_systemd-networkd) or with my [Spoof MAC Address shell script](https://github.com/Fincer-altego/basics-of-a-linux-server-school-course-/blob/master/spoof_mac_address.sh).
Unique MAC address of a network interface (network card) can programmatically be spoofed with [these Arch Wiki instructions](https://wiki.archlinux.org/index.php/MAC_address_spoofing#Method_1:_systemd-networkd) or with my [Spoof MAC Address shell script](https://github.com/Fincer/linux_server_setup/blob/master/scripts/spoof_mac_address.sh).