by Ramesh Natarajan
on September 19, 2011
If you are a Linux sysadmin, you might not want others in your IT department, who has physical access to the server, change anything from the GRUB bootloader menu that is displayed during system startup.
GRUB is the 3rd stage in the Linux boot process that we discussed earlier.
GRUB security features allows you to set a password to the grub entries. Once you set a password, you cannot edit any grub entries, or pass arguments to the kernel from the grub command line without entering the password.
It is highly recommended to set GRUB password on any critical production systems as explained in this article.
[continue reading…]
by Ramesh Natarajan
on September 16, 2011
If you are running tomcat server that runs only on HTTP, follow the 2 easy steps mentioned below, to configure tomcat for SSL.
[continue reading…]
by SathiyaMoorthy
on September 16, 2011
Perl developers should understand how to use complex data structures effectively.
In this article, I picked the top 5 useful posts about complex data structures from perlmonks, and gave simple examples on how to use them.
[continue reading…]
by Ramesh Natarajan
on September 14, 2011
htop is just like top, but on steroids.
Once you are used to htop, you’ll never go back to top again.
htop is a ncurses-based process viewer.
You can interact with the htop using mouse. You can scroll vertically to view the full process list, and scroll horizontally to view the full command line of the process.
This article explains 15 essential htop command examples.
[continue reading…]
by Balakrishnan Mariyappan
on August 31, 2011
Installing, removing, and updating packages is a typical activity on Linux. Most of the Linux distributions provides some kind of package manager utility. For example, apt-get, dpkg, rpm, yum, etc.
On some Linux distributions, yum is the default package manager.
Yum stands for Yellowdog Updater Modified.
This article explains 15 most frequently used yum commands with examples.
[continue reading…]
by Ramesh Natarajan
on August 25, 2011
Implementing a disaster recovery solution is dependent on three factors — 1) time 2) resources 3) dollar amount.
Most organization doesn’t even think about DR when the IT infrastructure and applications are running without any issues. Most of them think about DR only when something breaks that created a major negative impact on the business.
[continue reading…]
by Ramesh Natarajan
on August 24, 2011
I’ve been working on my next eBook for the past several months. Anything that is important and useful takes lot of time to complete. I’ve spend numerous sleepless nights in making this book very easy to read and understand by providing lot of examples.
The book is in the final stage, and will be released very soon.
[continue reading…]
by Ramesh Natarajan
on August 17, 2011
GIT is the most versatile distributed version control system.
The way GIT tracks and handles file changes is very efficient and different than how other version control software tracks the changes (including CVS and Subversion).
This article is for those who are new to GIT. This is a jump-start guide that will show you how to install GIT from source, create a new project, commit changes to the GIT repository.
[continue reading…]