Some times it’s become necessary to find current boot disk path in Linux. The Boot disk path linux can be used for troubleshooting purpose in case any issues. This Boot partition or path contains the GRUB configuration which is bootloader in Linux.
You might be using famous putty tool for connecting to your server via ssh or telnet. However there is one more way , with which you can connect via Browser. Yes you heard it right you can connect server using Chrome web browser. No need of putty tool always. By using chrome extension Secure Shell you can connect server using Chrome web browser.
How do you experience when something goes wrong on your system. You look at the system logs, of course! In all seriousness, understanding system logging is important so that you can troubleshoot when something went wrong. In Linux system we have syslog which captures every activity occurring on the system. Generally they are stored on the local system at location “/var/log/messages” but we can configure centralized syslog server where we can dump all the logs centrally to monitor all the logs in one go.
We can able restrict Disk space once we enable disk quota which alerts a sysadmin before a user takes too much disk space or a partition becomes full.Quotas can only be created for partitions.Quota is of two types, user and group.
Security-Enhanced Linux (SELinux) is a Linux feature that provides the mechanism for supporting access control security policies.But SELinux can sometimes get in your way. In that case you need to turn off-disable SELINUX. However before you turn off-disable SELINUX make sure you have a valid reason ,why you are doing it.
With RHEL 7 RedHat has made significant changes the way Linux used to work. Here we are discussing New features in RHEL 7.
Kali Linux is derived from Debian Linux flavor and its mainly used for penetration tasting. It has more than 300 pre-installed penetration-testing programs. It is a supported platform of the Metasploit Project’s Metasploit Framework, a tool for developing and executing security exploits. Let begin with hack windows with Kali Linux.Kindly note that , I am […]
With AWS you can build free server on aws that to within a minute.amazon AWS offers free tier with a server “micro-instance” at no cost for one year.
Normally Linux servers are very much secured and illegal or unauthorised access is almost not possible with security policies in linux. However if linux can be installed on the laptop which makes it unsecured and worst situation occurs when you forget the laptop in public places such as trains, airports or bus where any proficient […]
Generally speaking Logs are very much important part of any troubleshooting activity, However these logs grows in size with time. In this case we need to perform log cleanup manually in order to reclaim the space and its tedious task to administer these logs. To overcome this we can configure logrotate utility available in Linux which automatically does […]