DON'T MISS

1 67
who command shows  following basic information Who is logged in  now ? Location (IP Address of the user ) System booting status Runlevel status...

0 106
The w is an good command which tell us status of Users logged in,What they are doing,CPU stats. The w command is like who command...

More to read

0 230
Install and Enable Epel repository: ## RHEL/CentOS 6 64-Bit ## # wget http://download.fedoraproject.org/pub/epel/6/x86_64/epel-release-68.noarch.rpm # rpm -ivh epel-release-6-8.noarch.rpm # yum install openvpn –y Copy sample Client configuration file under /etc/openvpn: #...

0 213
What are TCP Wrappers? TCP Wrappers can be used to GRANT or DENY access to various services on your machine to the outside network...

0 154
What is rootkit ? A rootkit is a collection of tools (programs) that enable administrator-level access to a computer or computer network. Typically, a cracker...

0 117
It's not a good idea to create a root equivalent user account,We are not recommending to create such user, this post is made for...

0 111
WHM/cPanel is most popular Linux-based website hosting control panel that provides graphical interface for hosting a website. It is a proprietary software that is...

0 205
OpenVPN is a open-source software application that is used to implement virtual private network (VPN) techniques for secure point-to-point connections in remote access facilities. Open...

0 191
What is MAC((Media Access Control) Address? The MAC address is a unique value associated with a network adapter. MAC addresses are also known as hardware...

0 165
SGID BIT (Set-group identification ) SGID permission on executable file SGID permission is similar to the SUID permission, only difference is, when the script or command...

0 173
Special Permissions (SUID,SGID and StickyBit )  In Linux The regular file and directory permissions in Linux world are read write and execute permissions on owner,...

1 254
What is Sticky Bit? Sticky Bit is mainly used on folders in order to avoid deletion of a folder and its content by other users...

1 211
We can  set acl on directory  but Standard Unix permissions might not be enough for some organisations. Here we  introduce  access control lists or...

0 298
This is very useful when we transfer data over the internet,  SCP is usually slow to transfer data.  Using tar over ssh is better...

0 115
Shred  ( Useful but dangerous ) Sometimes you need to destroy or wipe data from hard drives (for example, before you sell your old hard...

0 123
Deleting a file using rm command and re-create  using same name is very simple, but we should remember permission,attribute,ownership of a file before recreate...

0 1142
Enable the RPMForge Repo: Amavisd-new and ClamAV were installed from the RPMForge repository. To enable the RPMForge repository do the following (this example is for...

0 791
How To Configure SASL and TLS/SSL in Postfix on centos 6.5: SASL provide a mechanism to authenticate remote users by username and password who wish...

0 447
Did you forget MariaDB root password ? If yes, do not worry we have an easy way to reset database root password on Linux...

0 403
This tutorial explain about MariaDB installation running on a Linux server. This tutorial will make you understand how to install and setup MariaDB database...

0 777
Follow the steps to install and configure postfix server: Make entry for hostname : # vi /etc/hosts 127.0.0.1   localhost localhost.localdomain localhost4 localhost4.localdomain4 ::1         localhost localhost.localdomain localhost6 localhost6.localdomain6 192.168.0.102   pc1.6987.in #...

0 635
Guacamole Remote Administration Tool Installation on CentOS/RHEL 6 This article explain about an awesome Remote Administration tool called Guacamole  which will help you to fulfill...

Social Caring