If you are managing more than one equipment in your organization, it is very important to document and track ALL information about the servers effectively. In this article, I have listed 36 attributes that needs to be tracked for your equipments, with an explanation on why it needs to be tracked. I have also provided a spreadsheet template with these fields that will give you a jumpstart.
[continue reading…]
Most of the open source application uses MySQL database. To debug an issue with the open source application, it is very important to understand how to quickly get high level information about your MySQL database. In this article, I have explained how you can view the database, table, column and index information on any MySQL database using 9 examples.
[continue reading…]
When you are using Linux command line frequently, using the history effectively can be a major productivity boost. In fact, once you have mastered the 15 examples that I’ve provided here, you’ll find using command line more enjoyable and fun.
[continue reading…]
Most of you might have enabled wireless encryption, which is only one of the 6 steps mentioned in this article to make your wireless network safe and secure from hackers. The screenshots mentioned below are from Linksys wireless router. But, you’ll find similar options for all the 6 steps mentioned below in wireless routers from any other vendors.
Apart from these 6 steps to secure your wireless router, also make sure your wireless router firmware is up-to-date. Refer to our 4 easy steps to upgrade linksys wireless router firmware article for detailed instructions on how to upgrade your router firmware.
[continue reading…]
As part of Software for Geeks on-going series, earlier I wrote about Web based To-Do List Software. In this post, let us review about Web based time tracking software. For geeks to be ultra efficient and productive, it is very important to cut down the time spent on activities that are not aligned with your goals. If you track daily activities either manually or using some software, you will be surprised to find out how much time your may be spending on activities that don’t need such attention. Take a test drive of the following two free online time tracking software and pick the one that suites your need.
[continue reading…]
All Linux distributions comes with PHP. However, it is recommended to download latest PHP source code, compile and install on Linux. This will make it easier to upgrade PHP on an ongoing basis immediately after a new patch or release is available for download from PHP. This article explains how to install PHP5 from source on Linux.
[continue reading…]
Expanding the capacity of a server by adding new disk drives is a typical activity for administrator. In this article, let us review how to add two new disk drives to the DELL server and create RAID 1 using “Dell PowerEdge Expandable RAID Controller – PERC” configuration utility. This tool is also called as “PERC/CERC Bios Configuration Utility”.
If you are using the latest DELL Servers, please refer to the article that explains how to create RAID on PERC 6/i Integrated BIOS Configuration Utility.
[continue reading…]
The previous articles (openSSH to openSSH setup, SSH2 to SSH2 setup) explains about how to setup key based authentication on the same version of ssh to perform ssh and scp without entering password. This article explains how to setup SSH key based authentication between different version of SSH (from openSSH to SSH2) to perform ssh and scp without entering password.
[continue reading…]

My name is Ramesh Natarajan. I will be posting instruction guides, how-to, troubleshooting tips and tricks on Linux, database, hardware, security and web. My focus is to write articles that will either teach you or help you resolve a problem. Read more about