Linux | All Information About Hosting VPS and Domain

You are here:
Home » Archive for the " Linux " Category

Archive for "Linux"

openssh-gpg

Posted by 0 Responses

openssh-gpg Why bother? The traditional method of verifying the identity of a host with ssh is to use an ssh host key. In theory, you can get a copy of the host key from your system administrator via some secure method, such as in-person communications or perhaps via cryptographically signed email, before the first time you log into a host. In practice, it is often tempting to log into a host before the system administrator gets around to providing you a... [ Continue reading... ]

Top 8 Tools To Search Memory Under Linux / Unix [ Forensics Analysis ]

Posted by 0 Responses

Top 8 Tools To Search Memory Under Linux / Unix [ Forensics Analysis ] You can dump Linux or Unix server memory. This is useful for forensics analysis, and testing your own system. This is often desirable to see: What code and what data actually resides in memory. You can search for specific pids memory. Search memory for string and other data such as passwords. Works as add-on tool for gdb and others. Search/replace/dump memory from running processes and core files. All kinds of deep hacking... [ Continue reading... ]

Best Method To Reboot Remote Linux / Windows / UNIX Server

Posted by 0 Responses

Best Method To Reboot Remote Linux / Windows / UNIX Server Q. I've couple of Linux / Windows server hosted in remote data center? My ISP provides following option for rebooting the box: a) Graceful shutdown command b) An IPMI reboot c) A power strip Which one is the best way to reboot server and why? A. For UNIX like system shutdown command is the best way to reboot system in a safe way. Whey you issue graceful shutdown command all logged-in users are notified that the system is going down... [ Continue reading... ]

Red Hat Enterprise Linux 5 IMPORTANT Security Update

Posted by 0 Responses

Red Hat Enterprise Linux 5 IMPORTANT Security Update Red Hat today released kernel updates to fix at least 15 security flaws in its core called Linux kernel. RHEL users can grab the latest updates from RHN website or by simply running yum update command. This update has been rated as having important security impact. The Xen implementation did not prevent applications running in a para-virtualized guest from modifying CR4 TSC. This could cause a local denial of service. (CVE-2007-5907,... [ Continue reading... ]

The Novice Guide To Buying A Linux Laptop

Posted by 0 Responses

The Novice Guide To Buying A Linux Laptop All major laptop (notebook) hardware is supported by Linux. The important things to take into account when looking to buy a Linux powered laptops are as follows to avoid any hardware compatibility problems. Selecting correct specification is important. In this first part, I will cover what to look out for when buying a Linux powered laptop. Laptop Usage First, you need to decide and define the purpose of your laptop. Linux laptop can be... [ Continue reading... ]

10 Linux Commands Every ‘Linux User’ Must Know

Posted by 0 Responses

10 Linux Commands Every ‘Linux User’ Must Know Linux is a kernel acting as the heart of many operating systems including “the popular” Ubuntu, “the secure” Fedora, “the mobile” Android, etc. Unlike Windows, Linux was not developed to be user-friendly but to be free, robust, and customizable. That’s why much of the work on Linux require you to use commands (surprisingly, tons of things are done quickly using commands than doing them graphically). It’s the reason why... [ Continue reading... ]

 
All Information About Hosting VPS and Domain Search form
Free counters!
eXTReMe Tracker