DON'T MISS

1 803
who command shows  following basic information Who is logged in  now ? Location (IP Address of the user ) System booting status Runlevel status...

0 784
The w is an good command which tell us status of Users logged in,What they are doing,CPU stats. The w command is like who command...

More to read

0 1124
Install and Enable Epel repository: ## RHEL/CentOS 6 64-Bit ## # wget http://download.fedoraproject.org/pub/epel/6/x86_64/epel-release-68.noarch.rpm # rpm -ivh epel-release-6-8.noarch.rpm # yum install openvpn –y Copy sample Client configuration file under /etc/openvpn: #...

0 1111
What are TCP Wrappers? TCP Wrappers can be used to GRANT or DENY access to various services on your machine to the outside network...

0 948
What is rootkit ? A rootkit is a collection of tools (programs) that enable administrator-level access to a computer or computer network. Typically, a cracker...

0 871
It's not a good idea to create a root equivalent user account,We are not recommending to create such user, this post is made for...

0 927
WHM/cPanel is most popular Linux-based website hosting control panel that provides graphical interface for hosting a website. It is a proprietary software that is...

0 983
OpenVPN is a open-source software application that is used to implement virtual private network (VPN) techniques for secure point-to-point connections in remote access facilities. Open...

0 1023
What is MAC((Media Access Control) Address? The MAC address is a unique value associated with a network adapter. MAC addresses are also known as hardware...

0 865
SGID BIT (Set-group identification ) SGID permission on executable file SGID permission is similar to the SUID permission, only difference is, when the script or command...

0 801
Special Permissions (SUID,SGID and StickyBit )  In Linux The regular file and directory permissions in Linux world are read write and execute permissions on owner,...

1 866
What is Sticky Bit? Sticky Bit is mainly used on folders in order to avoid deletion of a folder and its content by other users...

1 1161
We can  set acl on directory  but Standard Unix permissions might not be enough for some organisations. Here we  introduce  access control lists or...

0 954
This is very useful when we transfer data over the internet,  SCP is usually slow to transfer data.  Using tar over ssh is better...

0 705
Shred  ( Useful but dangerous ) Sometimes you need to destroy or wipe data from hard drives (for example, before you sell your old hard...

0 684
Deleting a file using rm command and re-create  using same name is very simple, but we should remember permission,attribute,ownership of a file before recreate...

0 3172
Enable the RPMForge Repo: Amavisd-new and ClamAV were installed from the RPMForge repository. To enable the RPMForge repository do the following (this example is for...

0 2916
How To Configure SASL and TLS/SSL in Postfix on centos 6.5: SASL provide a mechanism to authenticate remote users by username and password who wish...

0 2092
Follow the steps to install and configure postfix server: Make entry for hostname : # vi /etc/hosts 127.0.0.1   localhost localhost.localdomain localhost4 localhost4.localdomain4 ::1         localhost localhost.localdomain localhost6 localhost6.localdomain6 192.168.0.102   pc1.6987.in #...

0 1525
Guacamole Remote Administration Tool Installation on CentOS/RHEL 6 This article explain about an awesome Remote Administration tool called Guacamole  which will help you to fulfill...

0 3017
Glype is a web-based proxy script written in PHP which focuses on features, functionality, and ease of use. A web-based proxy script is hosted on...

0 1227
As per one our client requirement. I had to set up smarthost for single domain in exim. I have googled and took some support...

Social Caring