Recent Articles

What Is Fork Bomb Attack? How To Prevent In Linux?

What is fork bomb attack? The fork bomb attack is a form of denial-of-service attack which uses the fork functionality to recursively create running processes by a single process. This attack works by creating a large number of processes very quickly in order to saturate the available space of the OS’s process table. Once the […]

July 6, 2011 | By
| Reply More

Manage Archives With Atool - Atool Utility In Linux

Linux provides various tools for archiving and compressing files such as zip, bzip, gzip, tar, rar, etc. There are more tools that are not native to Linux, but provide good archiving and compressing abilities. With such a large number of tools at hand, sometimes it becomes difficult to remember all the commands. "Atool" allows you […]

July 6, 2011 | By
| Reply More

Install/Configure/Stages Of Linux GNU Grub Bootloader

GNU GRUB is the GRand Unified Bootloader from GNU. Bootloader is the first software program that runs during the system startup. GRUB can load different operating systems. If you have Linux installed on your system, then you must have seen the bootloader menu from which you can choose between different OS's. This article provides an […]

June 24, 2011 | By
| 1 Reply More

Learn Linux DD Command - 15 Examples With All Options

You won’t find a more versatile utility than tar to create a file system–based backup. In some cases, however, you don’t need a backup based on a file system; instead, you want to create a backup of a complete device or parts of it. This is where the dd command comes in handy. The Linux […]

June 24, 2011 | By
| 4 Replies More

About Unix Scopeux Daemon

Openview performance agent. This daemon is related to the MWA agents that is responsible to monitored the applications, you can see the status with the following command: <<<<>>>>> /opt/perf/bin/mwa status <<<<>>>>>>> /opt/perf/bin/mwa stop <<<<<>>>>>> /opt/perf/bin/mwa start Daemon scopeux not running. Solution: ======== In this case, you should check from the logs any process couldn't register with […]

June 24, 2011 | By
| Reply More

Linux Watch Command - Repeat A Command At Regular Intervals

The server administrator needs to maintain the system and keep it updated and safe. A number of intrusion attempts may happen every day. There are some other activities that maintain their log. These logs are updated regularly. In order to check these updates, the commands are executed repeatedly. For example, for simply reading a file, […]

June 21, 2011 | By
| Reply More

How To Scan/Detect New LUNs In Redhat Linux & Outputs To Remember

You use the below commands to identify existing LUNs and How to add newly mapped LUNs to Linux. Check the current attached disks. #cat /proc/scsi/scsi | egrep -i 'Host:' | wc -l #fdisk -l 2>/dev/null | egrep '^Disk' | egrep -v 'dm-' | wc -l Check current multipath setup using multipath or powermt command. # […]

June 12, 2011 | By
| 8 Replies More

Tload Command - Linux CPU Load Monitoring Graph

There are a number of graphical utilities like gnome-system-monitor present for checking the system performance. But sometimes you might need text based tools. This article discusses a command line utility ‘tload’ that can be used to view the system load graphically. The tload command. The ‘tload’ command represents the pictorial representation of the average system […]

June 12, 2011 | By
| Reply More

GPG Command Linux: Examples To Encrypt And Decrypt File In Linux

GPG is an encryption and a signing tool for Linux/Unix-like operating system. Using GPG, you can encrypt and decrypt files with a password. Basically GPG uses a pair of keys such as public key and private key. Data encrypted with one key can only be decrypted with the other. You can use GPG to provide digital encryption and signing services […]

June 12, 2011 | By
| Reply More

Binding A Range Of IP Address To One Ethernet Interface

A single Network Interface Card (NIC) can be configured with multiple IP addresses. Suppose, you have a web server having multiple domains and each uses SSL, then you need to assign a dedicated IP address for each of the domain. If you have only one ethernet card available in your server, you can make use […]

May 30, 2011 | By
| Reply More

What is Initrd Image? How To Create Initrd Image In Linux

The boot process of a Linux system involves a number of stages. These include the BIOS initialization, reading the MBR, the bootloader, kernel initialization and the init process. The initrd (initial ramdisk) plays a very significant role in booting up the system. This article discusses this initrd ramdisk and how we can create it if […]

May 27, 2011 | By
| 1 Reply More

7 Examples Linux Dmidecode Command - Display Hardware Details In BIOS

Dmidecode command reads the system DMI (Desktop Management Interface) table to display hardware and BIOS information of the server. The output of the dmidecode contains several records from the DMI table. This table contains a description of the systems hardware components and also other useful information such as serial number, BIOS revision, etc. As you […]

May 27, 2011 | By
| Reply More