Unix

all about unix systems (Hpux/IRIX/Solaris/BSD

Linux vs Unix – How is UNIX different from Linux

Linux and Unix are two terminologies that are interchangeably used to refer to the same Operating system. This is largely due...

Write a TCP Server in Python – Part 2

This article is for people that have good knowledge in Python and want...

Add Package Management Tool On FreeBSD 10

In this short tutorial, let us see how to add pkg management tool and install packages on FreeBSD 10. Check  and  Download  pkg management tool  root@Freebsd10:~...

Block SSH Brute Force Attacks Using SSHGuard

SSHGuard is a fast and lightweight monitoring tool written in C language. It monitors and protects servers  from brute force attacks using their logging...

How to install Nextcloud on CentOS 7

Introduction In a previous tutorial we talked about the installation of Nextcloud on an Ubuntu 16.04 server with Apache. Remember, Nextcloud is a cloud storage...

How to deploy Rocket.Chat on AWS – Part II

Introduction This is the second part of the tutorial on how to deploy Rocket.Chat on AWS (Amazon Web Services). In part one we saw how to...

How to Measure Disk Performance with fio and IOPing

Whether it's a server, or a PC for work, what usually limits performances is disk speed. Even if using SSDs, their speed is not...

Unlocking the Power of Unix: A Guide for Aspiring Bloggers and...

Writing and blogging have become two of the most well-liked pastimes on the web. However, you'll need to be inventive and unique if you...

Container: Docker Compose on Ubuntu 16.04

What is Docker Compose Docker Compose is a tool for running multi-container Docker applications. To configure an application’s services with Compose we use a configuration...

Unix/Linux File Recognition. Did You Know?

Did you know that Unix and Linux has no concept of a file extension? What is a file name extension? A .txt extension tells us...

Learn file management commnad line required for RHCSA

3.0 Introduction to Red Hat Linux Key file system Welcome back, in this ‘RHCSA examination preparation guide’ series two articles are published, this is third...

How to Prevent SSH Brute Force Attacks with Fail2Ban on Debian...

Fail2ban is an open-source intrusion prevention system that can be used to prevent brute force attacks and other suspicious malicious attacks. It scans log...

What is UNIX used for? – Popular use cases

In our previous topic, we introduced the UNIX operating system and touched base on what it does and its quintessential components....

Installing Invoice Ninja on CentOS 7 w/ NGINX & MariaDB –...

Introduction In the first part of this tutorial, we configured a CentOS 7 server with all the prerequisites required by Invoice Ninja. Now, let's look...

FreeBSD Asterisk test between 2 extensions

Asterisk — Open source PBX system. Developed by Mark Spencer. Working on Linux, FreeBSD, OpenBSD and Solaris operation systems. The project name created from...

Exception Handling in Python

You know you get serious with Python programming language when you start to learn about exception handling. But why do we need exception handling? The...

How Can We Use Operators In Linux and Unix CLI?

A token that performs a control function. It is a newline or one of the following: Ampersand ( & )  When a line ends with ampersand...

LS Command: Listing Files in Unix Systems

What is the LS Command? If you occasionally use Linux and Unix based operating...