Just Host Review

In a Nutshell Affordability is the name of the game with Just Host. The provider's longer-term plans are among the cheapest out there, which makes this a good choice for... Read more

How to Monitor User Activity with psacct or acct Tools

psacct or acct both are open source application for monitoring users activities on the system. These applications runs in the background and keeps track of each users activity on your... Read more

What’s Difference Between Grep, Egrep and Fgrep in Linux?

One of the renowned search tool on Unix-like systems which can be used to search for anything whether it be a file, or a line or multiple lines in file... Read more

How to Scan for Vulnerabilties with ClamAV

How to Scan for Vulnerabilties with ClamAV Introduction The following instructions show how to run a malware scan using ClamAV on your system. This guide will help you investigate a... Read more

Upgrading glibc for the GHOST Vulnerability

Upgrading glibc for the GHOST Vulnerability GHOST is a vulnerability that was announced on January 27th 2015, which affects the glibc library on Linux systems. This vulnerability affects all Linux... Read more

Learn How to Set Your $PATH Variables Permanently in Linux

In Linux (also UNIX) $PATH is environment variable, used to tell the shell where to look for executable files. $PATH variable provides great flexibility and security to the Linux systems and... Read more

Create a Self-Signed TLS Certificate

Create a Self-Signed TLS Certificate What is a Self-Signed TLS Certificate? Self-signed TLS certificates are suitable for personal use or for applications that are used internally within an organization. If... Read more

Mitigating memcached Amplification Attacks

Mitigating memcached Amplification Attacks What is Memcrashed? Recently there has been a significant increase in large-scale UDP reflection and amplification attacks across the internet. These attacks were all using the... Read more

A Linux Sysadmin’s Guide to Network Management, Troubleshooting and Debugging

A system administrator’s routine tasks include configuring, maintaining, troubleshooting, and managing servers and networks within data centers. There are numerous tools and utilities in Linux designed for the administrative purposes.... Read more

How to Configure a Firewall with UFW

How to Configure a Firewall with UFW What is UFW? UFW, or uncomplicated firewall, is a frontend for managing firewall rules in Arch Linux, Debian or Ubuntu. UFW is used... Read more