DNS server configuration Please select 720p HD quality in setting for better quality of the video log visualization.
Linux I/O Scheduler is a process of accessing the block I/O from storage volumes. I/O scheduling is sometimes called disk scheduling. Linux I/O scheduler works by managing a block device’s request queue. It selects the order of requests in the queue and at what time each request is sent to the block device. Linux I/O Scheduler manages the request queue with the goal […]
How to change the ssh banner for the linux system. Adding customized Linux login banner on the Linux system adds protection on the legal front & also it acts as the warning information to the user. This banner is shown to the user before the user logged into the system/OS. Since by default system does […]
You always need to think in terms of how can we secure server so that it will not be targeted by the hacker. Here is the simple trick is to restrict users in ssh configuration to secure the server. By default ssh configuration accepts all the users to the server, that’s the biggest loop hole in […]
secure ftp port: Making the secure ftp port is more important as you already know that vsftpd use default port 21 for making the connection with the server. So anybody (hacker) can try with the same port for connecting to server. But what if he/she doesn’t know the port for vsftpd for connection, yes off […]
You will be in the big trouble when dis-remember the root password. Only way to recover forgotten root password is to boot the server in single user mode to change the root password. Here is practical way of doing it. 1. Reboot the server with following combination when the system asks for username & password […]
ssh configuration trick to add more security. You already know that ssh use default port 22 in ssh configuration for making the connection with the server. So anybody (hacker) can try with the same port for connecting to server. But what if he/she don’t know the port for ssh for connection, yes off course then […]
Configure telnet service We know that SSH service is more secure than telnet, however sometime we need to configure telnet service on the server for connecting remotely to the server. So let’s move on to the practical way to configure telnet service. 1. Install the service using yum server. you need to have yum server […]