After creating your EC2 instance and connecting using PuTTY, this tutorials shows steps on how to run docker and setup a test Apache site using a docker image. This tutorial aims to introduce the basic operation of docker and how to use it on a Linux environment.Continue reading “Create test Apache site with Docker”
When you create a new EC2 instance and created new keys, the keys are on the pem key format. This is used for SSH connection and is usable from a Linux terminal or OSX. However, if you are from windows and you use PuTTY to connect to your EC2 instance, you need to convert your pem key to ppk format which is accepted by PuTTY.Continue reading “Connect to Linux EC2 instance using PuTTY”
This tutorial shows a step-by-step guide on how to launch an Amazon EC2 instance. We will launch a t2.micro instance using the Amazon provided AMI of Ubuntu 18.04. Let’s get started.Continue reading “How to Launch an AWS EC2 instance”
Docker is the most popular container technology. It is designed to make it easier to create, deploy, and run applications by using containers. Docker behaves similar to a virtual machine hypervisor. But unlike a virtual machine, rather than creating a whole virtual operating system, Docker allows applications to use the same Linux kernel as the system that they’re running on and only requires applications be shipped with things not already running on the host computer. This gives a significant performance boost and reduces the size of the application.Continue reading “Essential Docker commands”
You may find Ad-hoc mode (from Part II) easy to use on day-to-day tasks such as for quick systems checks or when updating a config file on multiple systems. Stepping up simple ad-hoc commands are Ansible playbooks (from Part III) and Ansible roles which are very powerful ways to utilize Ansible’s features.Continue reading “Ansible Part IV: Roles Overview”
A server being compromised or hacked for the purpose of this guide is an unauthorized person or bot logging into the server in order to use it for their own, usually negative ends. However, the majority of compromised servers are carried out by bots i.e. automated attack programs, in-experienced attackers e.g. “script kiddies”, or dumb criminals. These sorts of attackers will abuse the server for all it’s worth whilst they have access to it and take few precautions to hide what they are doing.
Grep is a very important & powerful Linux commands. It stands for ‘Global Regular Expression Print’ & is used for matching & printing a search pattern or a regular expression from a single or multiple text files. It will look for the pattern if the mentioned files & will than print the result on screen or to an output file.
In this tutorial, we are going to learn to use grep command with examples. Continue reading “How to effectively use the GREP command”
You probably have heard and tried using speedtest.net to test you computer or smartphone internet speed. If you have your own server or VPS you can also test internet speed connection from the command-line using the speedtest-cli utility. On this tutorial, I’ll show how to install and use speedtest-cli to test your internet speed.