What are access control lists (ACLs)?
Access control lists (ACLs) allow you to assign permissions to many different users and groups on individual files or directories.
Access control lists (ACLs) allow you to assign permissions to many different users and groups on individual files or directories.
mdadm multipathing is a failover solution (no load balancing) what means that only one path is used at any one time.
Under Lubuntu 20.04, I could not get libreoffice to print the text of any documents and created PDFs produce blank documents.
mpack encodes the named file in one or more MIME messages and sends the message to one or more recipients
Every Linux system has three options when clearing cache without interrupting any processes or application services.
A short article which provides a brief description for ssh related commands
When a ssh-key authentication is not enough, the quickest solution for a server could be to make ssh to ask for 2-factor token when logging in.
A Comparison of Popular Linux Package Managers
RPM is a command line package management utility used for installing, uninstalling, updating, querying and verifying software packages.
SSH has a key management capacity and related agents.When configured with public key authentication, your key proves your identity to remote SSH hosts
Here is a list of processes and configurations that you can use to tighten and enhance SSH security with regard to remote host access
By default, RHEL doesn't prompt for a password and we are given root shell directly, as usually Single User mode can be used to reset root password.
This document explains how to use Oracle Solaris to users who have experience operating systems in a Linux environment.
The find command in UNIX and Linux is a command line utility allowing you to search for files in a directory hierarchy.
isodump is a crude utility to interactively display the contents of iso9660 images in order to verify directory integrity
isodump is a crude utility to interactively display the contents of iso9660 images in order to verify directory integrity
Unlike OEL/RHEL/CentOS 6, manually appending “HOSTNAME=xxxxx” into file /etc/sysconfig/network and restarting system will not work on version 7.
A simple post for those who are new to Oracle Enterprise Linux (OEL) or Red Hat Linux (RHEL) version 6 and wish to change hostname.
An update to rkhunter will fail with Invalid WEB_CMD configuration option: Relative pathname: "/bin/false"
The use of logical volumes is similar to the use of partitions and is accomplished with the same standard commands (mkfs, mount, fsck, df, ...)
A volume group (vg) is an abstraction layer between block devices and logical volumes. The commands used to manage a volume group start with vg
A physical volume (pv) is any block device (a disk, a partition, a RAID device, an iSCSI device, etc.)
A SYN Attack is a denial of service (DoS) attack that consumes all the resources on your machine, forcing you to reboot.
A quick procedure to change the UID and GID for a given user using the usermod and groupmod commands.
A simple article providing the steps necessary to get GeoIP working with PHP on Ubuntu systems.
How to easily restore the classing scroll bar (disable overlay scrolling) or to re-enable it if disabled under Ubuntu 14.04 and 16.04 LTS
A simple article on how to create a failover SSH server on a Ubuntu system, allowing you to connect on an alternative port of the original SSHD fails
During a test build of Ubuntu 15.10 I suddenly received the following error when refreshing the packages from the repository.
Using Gmail's SMTP server as Postfix relay for reliable email delivery and also for logging all outgoing mails.
This document describes how to use a Linux computer to extract the BaseSystem.dmg image file from an Mac OS X (10.7+) installation DVD
This is a simple screenshot of how to send the Ctrl+Alt+Del key sequence to a VM guest
AIDE provides an additional layer to your server security not by keeping intruders out but by notifying you as the sysadmin of a possible intrusion.
This article provides the simple steps needed to uninstall the VMware workstation from a Linux host. You must run the command from a Linux server.
With the release of 9.0, the NetWorker Server and Management Console will now run only on Linux 64-bit and Windows 64-bit systems.
This article provides a quick procedure on how to recover a lost root password frm virtually any version of Linux which uses the GRUB boot loader.
This article provides a quick reference to UFW commands that will create iptables firewall rules are useful in common, everyday scenarios.
AeroSnap is a feature of some window managers to anchor the windows to the screen edges.
Puppets automated management of installed applications and libraries can be enhanced with custom package repositories such as a custom repository.
This post provides a basic installation and configuration of Tomcat 7 on a CentOS 7 server.
LAMP is a popular server stack using apache to deliver dynamic content; LEMP utilises ngnix to achieve the same open source technologies.
APT originally designed as a front-end for dpkg to work with debian packages, but it has since been modified to also work with the RPM via apt-rpm.
There are commands that do the same things in Windows DOS and from the command prompt as in UNIX, they just have a different syntax.
Telling the server to pause for 30 seconds before attempting to mount network shares could prevent a
How to configure SSH to allow access using GSSAPI and achieve single-sign-on using vendor supplied OpenSSH or OpenSSH downloaded from the internet.
Either due to cloning or corporate naming standards, you may find the need to change the hostname of an Oracle Enterprise Linux System.
If like me you're not a fan of Spotlight and want to disable it completely then you can hese simple steps.
The idea behind SysV init runlevels revolves around the idea that different systems can be used in different ways.
To switch to a graphical environment, you may need to install additional software from the RHEL Internet repository or installation DVD.
In this post, we walk through steps you can follow to check the status of SELinux and also disable it in OEL 6, if it is enabled.
A short article on how to mount a DFS (distributed file system) on an Oracle Linux 5.11 system.
CYGWIN has many utilities you can install to make life as a UNIX administrator more homely within a windows environment, except cron
HOW TO: Setup SAN boot for RHEL 6.x using native multipath on EMC storage
A simple post which outlines the steps needed to configure iSCSI with Multipathing on Red Hat Enterprise Linux 6.5
This is a relatively simple question, but alas, poor Yorick!, the answer is not plain sailing as all flavors of UNIX and Linux have different tools.
how to setup acls on files in a directory