A list for protecting yourself and others from the most common and easiest-to-pull-off security crimes.
This article does not attempt to make you an information security guru or provide everything needed for those who are special targets. This is a list you can use to secure yourself, your significant other and your non-techie loved ones from the majority of the most-common and easiest-to-pull-off types of crime and cruelty. Continue reading “17 Things about Security”
Every Linux process has a process ID (PID) assigned to it. It is a unique identification number that is automatically assigned to each process when it is created in an operating system. A process is a running instance of a program. In this tutorial we’ll look into ways on how to find the PID of process.
Continue reading “How to find out PID in Linux”
Do you ever wonder how many thousands of packages are installed on your Linux system? Even a fairly modest Linux system is likely to have well over a thousand packages installed. And there are many ways to get details on what they are. Here are some of the most useful commands for gaining insights into the packages installed on your Linux system using APT on Ubuntu / Debian systems.
Continue reading “APT Listing Packages – Ubuntu / Debian”
This tutorial will walk through the troubleshooting and recovery of a failed disk on a Software RAID setup. Especially mirroring the boot partition which is important when replacing disk and making sure the OS boots up properly after replacement. This tutorial was done on Ubuntu 14.04 but should still work on other distributions such as RHEL and CentOS.
Continue reading “Software RAID Recovery Tutorial”
SSL secured websites or HTTPS has now become a must to have on website, especially those handling sensitive client information. Having a HTTPS enabled website means that a intruder can’t intrude to communication between users and website. HTTPS not only secures communication but is now a requirement for many new features like http2, which requires you to have https enabled on your server. Having a HTTPS enabled website also improves your Google SEO (Search Engine Optimization) ranking.
In this tutorial, we will discuss two methods on how we can redirect http traffic to https on Apache web servers.
Continue reading “Redirect HTTP to HTTPS on Apache”
We might have come across a situation where we might want to rename user in Linux system, for whatever reasons. We can easily rename user in Linux and also we can rename the home directory or its UID as well.
In this short tutorial, we will be discussing these things only.
Continue reading “Properly rename user accounts in Linux”
Databases are arguably one of the main component of any modern application. And one of the most popular implementation of SQL databases is Mysql or the new replacement MariaDB. As a system administrator, you probably have installed and configured a database before. This tutorial will walk though setting up the master-slave replication of MariaDB.
Continue reading “Setup Master Slave replication in MariaDB”
Disks getting full on Linux is a common scenario any administrator have probably experienced. There are usually some large files in /var/log directory that can be compressed or deleted to save disk space. Have you ever experienced deleting a large log file and noticed that the disk usage remained the same ? It’s as if the file size usage is not released even though you’ve deleted it?
This scenario can happen if you deleted/renamed/moved an existing file that is currently in use by a running program. This usually happens on log files that are not rotated regularly and then when the file size becomes large, you deleted (or compressed) the file without even checking if it is in-use. Don’t worry, you can still recover your disk space as shown from the example below.
Continue reading “Recover disk usage after deleting large file in Linux”