Frequently Asked Questions

Howto- Install Python 3.x in Ubuntu, Debian, Fedora & Centos

Question: How to install Python 3.x in Ubuntu, Fedora &  Centos? Answer: 1- To be able to compile Python Source, you will need few packages. Open...

Howto- add FTP Users For VSFTP

Question : How to add FTP Users For VSFTP  Server ? Answer : Before you can add any users to VSFTP, the user must already exist...

Suspend VS hibernate in Linux, what is the difference?

Question: Suspend VS hibernate in Linux, what is the difference? Answer: Suspend stops operation of all applications and system state is saved in RAM, the machine...

How to Monitor Realtime Network Traffic in Ubuntu / Debian /Mint

Question: How to Monitor Realtime Network Traffic in Ubuntu / Debian /Mint  ? Answer: What you need to do is to install ifstat tool,  from terminal...

What are the sendmail configuration files?

Question: what are the sendmail configuration files  ? Answer : Sendmail uses the following configuration files: /etc/mail/access                      sendmail access database file /etc/mail/aliases...

Solved – PHP Warning: Module ‘PDO’ already loaded in Unknown on...

Question : I got this error  Log in CMS  (Joomla  and  Wordpress) : PHP Warning: Module 'PDO' already loaded in Unknown on line 0. Solution: First...

Useful commands for Linux normal users and administrators

Recently, CLI is mostly used by Linux/Unix administrators since most popular linux distros come with a complete set of GUI applications that make the...

Common Linux log files name and usage

Log files are very valuable files for Linux system security. In Linux, almost all log files are stored in ‘/var/log‘ directory. . . . .  Common Linux log files...

Howto- NumLock on by default in Linux

If you prefer that the NumLock is activated automatically when you turn on your computer, then follow the instructions in this post. Install the package ...

How to disable server signature using .htaccess or by editing Apache?

Question : How to disable server signature using .htaccess or by editing apache config file? Answer: Attackers can use server signature to their advantage when performing...

How to Convert RHEL 6.x to Centos 6.x

Question : How to Convert your RHEL 6.x to Centos 6.x ? Answer : If you are using RHEL 6.x and you want to move...

How to turn Off linux password expiration?

 Question : How to turn off password expiration under Linux? Answer: . . . . .   The  Encrypted password list is stored  in /etc/shadow file cat /etc/shadow   root:$1$dkk&Iw6zvgu$P3ms0o5GiXv66BzNXe0:15294:0:99999:7:: This is the...

How to erase MBR in Linux

Question: How do I remove a third party boot loader from the MBR    Answer: Erase the first 512 bytes of the harddrive to remove the...

/usr/bin/install: omitting directory includes/rss/extlib

Question: How to  fix this Compiling issue in Nagios ? /usr/bin/install: omitting directory `includes/rss/extlib' /usr/bin/install: omitting directory `includes/rss/htdocs' /usr/bin/install: omitting directory `includes/rss/scripts' make: *** Error 1 make:...

How to upgrade to Opensuse 12.1

Opensuse 12.1 Final has been released, the following post will show How to upgrade your 11.X or 12.1 milestones to RC or Final...

Dolphin Can't Move Files to Trash

Question: Dolphin Can't Move Files to Trash. How to solev this ? Answer   I had  the same problems deleting  to the  Trash in OpenSuse 11.4   KDE ...

How to find large files and directories in...

Question:     How to  find the largest top 20 files and directories in my Linux ?   Answer : To  find   big  files  and  directories   you have  to use ...

How to Fomat USB Pen In Linux

Question : How  to  Format  USB  Pen  in Linux  ? Answer : First  Insert your  USB  pen in Linux  and  check the  name dvice  with fidsk -l ...

EDITOR PICKS

Follow us

0FansLike
0FollowersFollow
12,304FollowersFollow
528SubscribersSubscribe

Latest Articles

Exploring the Power of Tracker Applications on Android: Leveraging the Linux Foundation

Welcome to the world of tracker applications on the Android operating system.  A tracker application, in its simplest form, is a software program designed...

Unlocking the Power of Unix: A Guide for Aspiring Bloggers and Writers

Writing and blogging have become two of the most well-liked pastimes on the web. However, you'll need to be inventive and unique if you...

5 Major Benefits of Having a Managed Security Services Provider (MSSP) For Unix and...

The annual security breaches for Unix and Linux infrastructure is at an all-time high, with almost 1.7 million Linux malware floating across the internet...

Revolutionizing Video Making with Linux: Unleashing Creative Potential

In today's digital age, videos have become an integral part of our lives. From social media platforms to professional presentations, videos have the power...

Empowering Linux Systems with ChatGPT Integration

Introduction ChatGPT development services is an open-source tool that can be integrated with Linux systems for secure and remote communication. With ChatGPT development services, you...

Popular Post

Everything you should know about RHCSA Certification

Things you should know about RHCSA Certification Exam RHCSA or Red Hat Certified System administration exam is designed to test your knowledge and skills which...

Related Posts

A Guide To Implementing Segregation of Duties (SoD) in Linux Environments

In today's ever-evolving cyber threats, organizations must implement robust security measures that safeguard their valuable data and resources. One such essential measure is the...