≡ Menu

How to Password Protect Grub Boot Loader in Linux

If you are a Linux sysadmin, you might not want others in your IT department, who has physical access to the server, change anything from the GRUB bootloader menu that is displayed during system startup.

GRUB is the 3rd stage in the Linux boot process that we discussed earlier.

GRUB security features allows you to set a password to the grub entries. Once you set a password, you cannot edit any grub entries, or pass arguments to the kernel from the grub command line without entering the password.

It is highly recommended to set GRUB password on any critical production systems as explained in this article.
[continue reading…]

2 Easy Steps to Enable SSL / HTTPS on Tomcat Server

If you are running tomcat server that runs only on HTTP, follow the 2 easy steps mentioned below, to configure tomcat for SSL.
[continue reading…]

Perl developers should understand how to use complex data structures effectively.

In this article, I picked the top 5 useful posts about complex data structures from perlmonks, and gave simple examples on how to use them.
[continue reading…]

Top on Steroids – 15 Practical Linux HTOP Examples

htop is just like top, but on steroids.

Once you are used to htop, you’ll never go back to top again.

htop is a ncurses-based process viewer.

You can interact with the htop using mouse. You can scroll vertically to view the full process list, and scroll horizontally to view the full command line of the process.

This article explains 15 essential htop command examples.
[continue reading…]

15 Linux Yum Command Examples – Install, Uninstall, Update Packages

Installing, removing, and updating packages is a typical activity on Linux. Most of the Linux distributions provides some kind of package manager utility. For example, apt-get, dpkg, rpm, yum, etc.

On some Linux distributions, yum is the default package manager.

Yum stands for Yellowdog Updater Modified.

This article explains 15 most frequently used yum commands with examples.
[continue reading…]

20 Things to Plan for an IT Disaster Recovery

Implementing a disaster recovery solution is dependent on three factors — 1) time 2) resources 3) dollar amount.

Most organization doesn’t even think about DR when the IT infrastructure and applications are running without any issues. Most of them think about DR only when something breaks that created a major negative impact on the business.
[continue reading…]

Quick Update on the Upcoming eBook

I’ve been working on my next eBook for the past several months. Anything that is important and useful takes lot of time to complete. I’ve spend numerous sleepless nights in making this book very easy to read and understand by providing lot of examples.

The book is in the final stage, and will be released very soon.
[continue reading…]

GIT is the most versatile distributed version control system.

The way GIT tracks and handles file changes is very efficient and different than how other version control software tracks the changes (including CVS and Subversion).

This article is for those who are new to GIT. This is a jump-start guide that will show you how to install GIT from source, create a new project, commit changes to the GIT repository.
[continue reading…]