On a VMware ESXi server, you can create a new VM and install a guest OS on the VM using a CD or DVD.
For this, you need physical access to the server to insert the installation CD or DVD, which might not be possible, if the server is in a remote datacenter.
The quick and easy way is to upload the OS ISO image to VMware datastore, and use that image to install OS on a new VM.
The advantage of this method is that you don’t need physical access to the VMware ESXi server.
This tutorial explains how to upload ISO image, and use that to install guest OS on a new VMware VM.
Chef is an IT infrastructure automation software, which can be used to manage all your servers and network equipments in your organization.
You need a chef workstation when you want to interact with the chef server, or any physical nodes (servers, network equipments, etc) in your infrastructure.
On a chef workstation, using several chef related commands (for example, knife), you can create cookbooks, or create recipes that will be executed on the individual nodes. You can also bootstarp a new node from chef workstation.
This tutorial explains how you can install and configure Chef workstation on a Linux server.
If you are using one of the newer Nikon DSLR camera, you can enable Wi-Fi directly on the camera.
There are few advantages to enable Wi-Fi on your DSLR.
Performing fsck on non-root filesystem is fairly straight forward. But, for root filesytem, you cannot perform fsck when it is mounted.
This quick tutorial explains how to force filesytem check for a root filesystem.
Apple iOS apps are written in Objective C language.
Objective C is an extension of C Programming Language and it’s an Object Oriented Language.
For creating an iPhone app you need two things: 1) Apple’s Mac Laptop or Desktop 2) Xcode for IDE.
If you are a newbie to iPhone app development, this tutorial will guide you through step-by-step on how to create your first iPhone app.
DROWN stands for Decrypting RSA with Obsolete and Weakened eNcryption.
This is from Vulnerability Note VU#583776: Network traffic encrypted using RSA-based SSL certificates over SSLv2 may be decrypted by the DROWN attack.
This is also referred as CVE-2016-0800.
To fix the problem, you should simply disable support for SSLv2 on servers that are using RSA-based SSL certificates. SSLv2 has been deprecated since 2011. There is no reason for you to use SSLv2 anymore.
LUKS is the disk encryption for Linux.
First time when you encrypt a partition with LUKS (or when you select encrypt disk option during OS installation), you have to specify a password that will be used when you open the LUKS partition.
But, after that, you can mount and unmount the partition as many times as you like without having to enter the password until you reboot the system.
If you are new to Amazon AWS, and looking at their offerings, it can be bit confusing, as they have lot of services.
If you are just looking to launch a virtual server on the cloud, it is relatively straight forward, and you can use Amazon’s EC2 service.
But, when it comes to storage and database for your virtual instance on the cloud, Amazon has multiple choices.
In this tutorial, we have listed the most popular storage and database services available from Amazon.