≡ Menu


What is virtualization? In simple terms, virtualization is a simulated platform or environment on top of a host node, which is quite abstract for an user. These simulated virtual environment can be an operating systems, or some development environment, etc. This gives us the ability to efficiently use the hardware resources of the host node. [...]

{ 1 comment }

How to Fix Curl TLS SSL Protocol Issue from CLI and PHP Code

Q: On one of our server, the webserver is not setup to support SSLv2 or SSLv3. Both are disabled on the server side. It supports only TLSv1. How can I get curl to work from both command line, and from inside my PHP code? A: In most case, curl will automatically pick the correct protocol [...]


Q: I have multiple yum repositories on my system. For example, centos, epel, docker, mongo, etc. When I execute yum update command, installed packages from all the repositories are updated. How can I exclude a specific repository during yum update? A: During yum update, to exclude packages that belongs to a specific repository, use any [...]

{ 1 comment }

How to Setup Linux iSCSI Storage Target and Remote Client Access

iSCSI stands for Internet Small Computer System Interface. This works on TCP/IP layer and allows SCSI commands to be sent over local area networks (LAN). It is used to access the storage on your network over TCP/IP using block-level data transfers. There is often a comparison between NFS vs iSCSI. The key difference is NFS [...]

{ 1 comment }

How to Install and Setup Chef Workstation on Linux

Chef is an IT infrastructure automation software, which can be used to manage all your servers and network equipments in your organization. You need a chef workstation when you want to interact with the chef server, or any physical nodes (servers, network equipments, etc) in your infrastructure. On a chef workstation, using several chef related [...]


Performing fsck on non-root filesystem is fairly straight forward. But, for root filesytem, you cannot perform fsck when it is mounted. This quick tutorial explains how to force filesytem check for a root filesystem. In this example, /dev/sda1 partition is the root filesystem that is mounted as / # df -h Filesystem Size Used Avail [...]


DROWN stands for Decrypting RSA with Obsolete and Weakened eNcryption. This is from Vulnerability Note VU#583776: Network traffic encrypted using RSA-based SSL certificates over SSLv2 may be decrypted by the DROWN attack. This is also referred as CVE-2016-0800. To fix the problem, you should simply disable support for SSLv2 on servers that are using RSA-based [...]


LUKS is the disk encryption for Linux. First time when you encrypt a partition with LUKS (or when you select encrypt disk option during OS installation), you have to specify a password that will be used when you open the LUKS partition. But, after that, you can mount and unmount the partition as many times [...]