Recent Articles

Power of Linux lsof Command for Daily Usage in Linux

"lsof" stands for List Open Files. It is extremely useful for a system administrator to find out the details about files that have been opened and their respective processes. In Linux, everything is just a file -  pipes, directories, inodes, or IP sockets. With the help of this command, you can monitor your system for what is actually going on, […]

May 9, 2011 | By
| Reply More

How to Encrypt/Decrypt and Signing using GPG Command in Linux

There is no absolute security on the internet or through a network. Because our equipment are regularly connected on the internet and there is some communication, we need to protect the criticals information we exchange. Encryption will be a welcome safeguard for whenever you, your family, or business partners need to communicate sensitive information from […]

May 9, 2011 | By
| Reply More

Linux Tcp Ports - How To Use Netstat and Iptables For Linux Troubleshooting

It is a well known fact that Linux/Unix systems are mostly used as servers and are often in connection to the internet. In such platforms, access is limited by ports used. The term 'port' means a number access point that is used to access your system much like a telephone number. Ports are usually connected […]

May 8, 2011 | By
| Reply More

How To Fix if Partition Table Entries not in Disk Order

The suggestion given below can help if your partition table is not in a proper disk order. From linux fdisk (fdsik /dev/), choose the advanced menu (by pressing x, afaik), then choose the entry for correcting partition ordering (press 'm' anytime to get some help on commands). You should know that after following the step above, your […]

May 5, 2011 | By
| Reply More

How To Reset Root Password In Linux with Screenshot

This article explains the process of resetting the root password in a CentOS Linux machine in case you have forgotten the root password. “Root” is the superuser of a Linux machine. In order to access the Linux server as a root user, you need to authenticate first. In case you have forgotten root password, you […]

May 5, 2011 | By
| Reply More

How To Increase Maximum Number Of Open Files

Command to list the number of open file descriptors Use the following command to display the maximum number of open file descriptors: #cat /proc/sys/fs/file-max The number of maximum files was reached. How do I fix this problem? Many applications such as Oracle database server needs this range to be quite higher. So, you can increase the maximum number […]

May 2, 2011 | By
| Reply More

Linux Ethtool Helps Troubleshooting Ethernet Network Cards Issues

The Ethtool command is used to change Ethernet adapter settings. With the use of this command, you can change network card speed, auto-negotiation, wake on LAN setting, duplex mode etc. It is helpful to have some information about a particular network adaptor, specially in checking the software for compatibility. It is not available by default in installation. So, […]

May 2, 2011 | By
| Reply More

Linux Boot Into Root Shell Without Prompting Password

Take the following steps: 1.Reboot server 2. Next, you will see grub-boot loader screen. Select Recovery mode and the version of the kernel that you wish to boot and type 'e' for edit. Select the line that starts with 'kernel' and type 'e' to edit the line. 3. Go to the end of the line […]

May 2, 2011 | By
| Reply More

6 Examples Linux Chage Command : Set Password Aging For User

The command name ‘chage’ is an acronym for ‘change age’. This command is used to change the user's password's aging / expiry information. Any user can execute this command with the ‘-l’ option to view their password and aging information. No other unauthorised users can view the password's aging/expiry information. As the root user, you can […]

May 2, 2011 | By
| Reply More

How Linux Who & Last Command Helps for Root Cause Analysis

The last command is very important in linux as it helps in doing root cause analysis of the linux system. Assume that something is changed in the linux system, in this situation you are not sure who has made the changes. Using the 'last' command you can identify who logged in at the particular time when the changes were made. […]

May 2, 2011 | By
| 1 Reply More

Example : How To Encrypt / Decrypt A File In Linux

If you are really concerned about the privacy and confidentiality of your files, encrypting files can help you. File encryption in Linux can be done in many ways, such as, using keys and software. GPG( Gnu Privacy Guard) by GNU is an encryption software provided free of charge. Here,we are trying to encrypt a file named “test”. GPG […]

April 30, 2011 | By
| Reply More

How to Display Physical / Volume Group / Logical Volume in LVM

Logical Volume Manager (LVM) for Linux provides a flexible and efficient way of disk management. Virtual partitions are created by using LVM. These virtual partitions can easily be resized in comparison to normal disk partitions. This article provides an overview of LVM and how these Logical Volumes can be activated. The physical partitions on the disk form Physical […]

April 30, 2011 | By
| Reply More

Few Tips Check Hard Disk Error and Health using smartctl

Checking the hard drive status of your pc is important. All the sensitive data is in your hard disk. In case of a hard disk failure, recovery is difficult and time consuming. Hard disks can have errors due to power failures and usage. Common errors include bad sectors or physical errors. Checking the hard disk status is […]

April 30, 2011 | By
| Reply More

How to Use ldapsearch command and Test ldap connection

The ldapsearch command opens a connection to an LDAP server, binds, and performs a search using specified parameters. The ldapsearch tool has four types of options: Common Options Input And Output Options LDAP Controls Options SSL (Secure Socket Layer) Options Common Options The ldapsearch -H command and option, when run on the command line, will display […]

April 30, 2011 | By
| Reply More