≡ Menu

Linux

In the previous articles we discussed about Nagios 3.0 Jumpstart guide and How to monitor remote Linux host using Nagios 3.0. In this article, l’ll explain how to monitor remote windows machine and the various service running on the windows server using nagios monitoring server. Following three sections are covered in this article. I. Overview [...]

{ 82 comments }

Howto Install MySQL on Linux

Most of the Linux distro comes with MySQL.  If you want use MySQL, my recommendation is that you download the latest version of MySQL and install it yourself. Later you can upgrade it to the latest version when it becomes available. In this article, I will explain how to install the latest free community edition [...]

{ 42 comments }

Howto resolve Algorithm negotiation failed issue on SSH

 While performing ssh from a local-host to a remote-host that are on different versions of ssh, it is possible that you may get “Algorithm negotiation failed” message.  In this post, I’ll explain how to resolve this issue from the ssh client.  1. Unable to ssh to remote-host: In this example, when trying to perform ssh [...]

{ 5 comments }

I explained previously how to Perform SSH and SCP without entering password on openSSH. In this article, I’ll explain how to setup the key based authentication on SSH2 and perform SSH/SCP without entering password using the following 10 steps. 1. Verify that the local-host and remote-host are running SSH2. Please note that ssh and scp [...]

{ 13 comments }

  PERC/CERC Configuration utility from DELL is used to manage the disks on the server and perform several disk related activities. for e.g. Create Logical Volumes with different RAID options, check for the consistency of the disks etc. During the server startup process, there is an option to Launch the PERC/CERC configuration utility. However sometimes it [...]

{ 4 comments }

  If you are using SSH client to connect to Linux server from your Windows laptop, sometimes it may be necessary to launch UI application on the remote Linux server, but to display the UI on the windows laptop. Following are two typical reasons to perform this activity: Install software on Linux from Windows: To launch [...]

{ 4 comments }

Protect Your Java Code from Reverse Engineering

 If you are developing java application, it is important to understand that the java class files can be easily reverse engineered using java decompilers. In this article, let us explore how a java class file is reverse engineered and how to protect your source code from being reverse engineered by someone. The java source code [...]

{ 28 comments }

Perform SSH and SCP Without Entering Password on openSSH

In this article, I’ll explain how to perform ssh and scp without entering the password using the SSH Public Key authentication with SSH Agent on openSSH There are two levels of security in the SSH key based authentication. In order for you to login, you need both the private key and the passphrase. Even if [...]

{ 50 comments }