UX Techno

Platform for learning UNIX & LINUX technologies

  • Home
  • Post Index
  • Contact US!
  • Privacy Policy

How to secure ftp port.

August 30, 2015 By admin Leave a Comment

secure ftp port: Making the secure ftp port is more important as you already know that vsftpd use default port 21 for making the connection with the server. So anybody (hacker) can try with the same port for connecting to server. But what if he/she doesn’t know the port for vsftpd for connection, yes off […]

Pages: 1 2
If this post helped you by any means, then Please
Support Us! by making Payment Payment Link.
Subscribe For RSS Feed::Here.
Like my facebook page FaceBook Page
Follow Us on Twitter:: Twitter
Follow Us on YouTube:: YouTube

How to recover forgotten root password in Linux.

August 12, 2015 By admin Leave a Comment

You will be in the big trouble when dis-remember the root password. Only way to recover forgotten root password is to boot the server in single user mode to change the root password. Here is practical way of doing it. 1.    Reboot the server with following combination when the system asks for username & password […]

Pages: 1 2 3 4
If this post helped you by any means, then Please
Support Us! by making Payment Payment Link.
Subscribe For RSS Feed::Here.
Like my facebook page FaceBook Page
Follow Us on Twitter:: Twitter
Follow Us on YouTube:: YouTube

Simple trick to add more security with ssh configuration.

August 9, 2015 By admin Leave a Comment

ssh configuration trick to add more security. You already know that ssh use default port 22 in ssh configuration for making the connection with the server. So anybody (hacker) can try with the same port for connecting to server. But what if he/she don’t know the port for ssh for connection, yes off course then […]

Pages: 1 2 3
If this post helped you by any means, then Please
Support Us! by making Payment Payment Link.
Subscribe For RSS Feed::Here.
Like my facebook page FaceBook Page
Follow Us on Twitter:: Twitter
Follow Us on YouTube:: YouTube

Quick way to configure telnet service.

August 8, 2015 By admin Leave a Comment

Configure telnet service We know that SSH service is more secure than telnet, however sometime we need to configure telnet service on the server for connecting remotely to the server. So let’s move on to the practical way to configure telnet service. 1.    Install the service using yum server. you need to have yum server […]

Pages: 1 2 3
If this post helped you by any means, then Please
Support Us! by making Payment Payment Link.
Subscribe For RSS Feed::Here.
Like my facebook page FaceBook Page
Follow Us on Twitter:: Twitter
Follow Us on YouTube:: YouTube

How to configure password less ssh login.

August 4, 2015 By admin 2 Comments

Connecting from one server to another server often asks the password before making connection. Also it asks the password while copying the data using scp command. This creates issue while automating the tasks using shell script. So to avoid the problem we need to configure the password less ssh login between the two servers/systems. So […]

Pages: 1 2 3
If this post helped you by any means, then Please
Support Us! by making Payment Payment Link.
Subscribe For RSS Feed::Here.
Like my facebook page FaceBook Page
Follow Us on Twitter:: Twitter
Follow Us on YouTube:: YouTube

Quick way to configure FTP server

August 2, 2015 By admin Leave a Comment

Using NFS and samba you can share the files within same network but what if you would like to share files with somebody from outside the network. In this case FTP server/service is the most suitable option. So let’s configure FTP server in quick way. 1.    You need to install the vsftpd using yum server.(Please […]

Pages: 1 2
If this post helped you by any means, then Please
Support Us! by making Payment Payment Link.
Subscribe For RSS Feed::Here.
Like my facebook page FaceBook Page
Follow Us on Twitter:: Twitter
Follow Us on YouTube:: YouTube

Quick Guide for Linux user access control list (ACL)

July 26, 2015 By admin 1 Comment

user access control In UNIX system you always need to deal with security towards the system. File or directory level user access control is one of them. Mainly the purpose of the user access control list is to provide secure access to the flies and directory within the system. There are only two commands to […]

Pages: 1 2 3
If this post helped you by any means, then Please
Support Us! by making Payment Payment Link.
Subscribe For RSS Feed::Here.
Like my facebook page FaceBook Page
Follow Us on Twitter:: Twitter
Follow Us on YouTube:: YouTube

Six awk command examples

July 15, 2015 By admin Leave a Comment

awk command examples : Awk is an text processing language which will typically use for extracting the required data from the flat file. You can define your requirements by using the conditions in the awk programming. This is widely used product in most of the UNIX like operating systems. To explain this I have given […]

Pages: 1 2 3 4
If this post helped you by any means, then Please
Support Us! by making Payment Payment Link.
Subscribe For RSS Feed::Here.
Like my facebook page FaceBook Page
Follow Us on Twitter:: Twitter
Follow Us on YouTube:: YouTube
  • « Previous Page
  • 1
  • …
  • 9
  • 10
  • 11
  • 12
  • 13
  • Next Page »
  • Facebook
  • RSS
  • Twitter
  • YouTube






Categories

  • AWS (26)
  • devops (15)
  • Extra (1)
  • Helm (2)
  • HPUNIX (4)
  • Kali Linux (2)
  • Kubernetes (7)
  • Linux (100)
  • LVM (4)
  • Python (2)
  • Ubuntu (3)
  • Uncategorized (4)

Subscribe to our mailing list

* indicates required

Subscribe to our mailing list

* indicates required


Subscribe to our mailing list

* indicates required


© 2016 UxTechno. The content is copyrighted to Manmohan Mirkar and may not be reproduced on other websites.