≡ Menu

36 Items To Capture For Practical Hardware Asset Tracking

Asset Tracking LogoIf you are managing more than one equipment in your organization, it is very important to document and track ALL information about the servers effectively. In this article, I have listed 36 attributes that needs to be tracked for your equipments, with an explanation on why it needs to be tracked. I have also provided a spreadsheet template with these fields that will give you a jumpstart.
[continue reading…]

MySQL Application LogoMost of the open source application uses MySQL database. To debug an issue with the open source application, it is very important to understand how to quickly get high level information about your MySQL database. In this article, I have explained how you can view the database, table, column and index information on any MySQL database using 9 examples.
[continue reading…]

15 Examples To Master Linux Command Line History

Bash Command Line ImageWhen you are using Linux command line frequently, using the history effectively can be a major productivity boost. In fact, once you have mastered the 15 examples that I’ve provided here, you’ll find using command line more enjoyable and fun.
[continue reading…]

6 Steps to Secure Your Home Wireless Network

Wireless RouterMost of you might have enabled wireless encryption, which is only one of the 6 steps mentioned in this article to make your wireless network safe and secure from hackers.  The screenshots mentioned below are from Linksys wireless router. But, you’ll find similar options for all the 6 steps mentioned below in wireless routers from any other vendors.
 
Apart from these 6 steps to secure your wireless router, also make sure your wireless router firmware is up-to-date. Refer to our 4 easy steps to upgrade linksys wireless router firmware article for detailed instructions on how to upgrade your router firmware.
[continue reading…]

Web Based Time Tracking – Software for Geeks #2

Time Tracking - ClockAs part of Software for Geeks on-going series, earlier I wrote about Web based To-Do List Software. In this post, let us review about Web based time tracking software. For geeks to be ultra efficient and productive, it is very important to cut down the time spent on activities that are not aligned with your goals. If you track daily activities either manually or using some software, you will be surprised to find out how much time your may be spending on activities that don’t need such attention. Take a test drive of the following two free online time tracking software and pick the one that suites your need.
[continue reading…]

Instruction Guide to Install PHP5 from Source on Linux

PHP LogoAll Linux distributions comes with PHP. However, it is recommended to download latest PHP source code, compile and install on Linux. This will make it easier to upgrade PHP on an ongoing basis immediately after a new patch or release is available for download from PHP. This article explains how to install PHP5 from source on Linux.
[continue reading…]

Dell ServerExpanding the capacity of a server by adding new disk drives is a typical activity for administrator. In this article, let us review how to add two new disk drives to the DELL server and create RAID 1 using “Dell PowerEdge Expandable RAID Controller – PERC” configuration utility. This tool is also called as “PERC/CERC Bios Configuration Utility”.
 
If you are using the latest DELL Servers, please refer to the article that explains how to create RAID on PERC 6/i Integrated BIOS Configuration Utility.
[continue reading…]

SSH Key based authentication setup from openSSH to SSH2

OpenSSHThe previous articles (openSSH to openSSH setup, SSH2 to SSH2 setup) explains about how to setup key based authentication on the same version of ssh to perform ssh and scp without entering password. This article explains how to setup SSH key based authentication between different version of SSH (from openSSH to SSH2) to perform ssh and scp without entering password.
[continue reading…]