How to Keep ‘sudo’ Password Timeout Session Longer in Linux

In recent articles, we’ve showed you 10 Useful Sudoers Configurations in Linux and Let Sudo Insult You When You Enter Incorrect Password, and in this article, we discovered a another... Read more

iPage Review

By Tim Brown Positioning itself as one of the most affordable Web hosting options on the market, iPage's hosting plans are cheap to get started with thanks to a big... Read more

Find Top Running Processes by Highest Memory and CPU Usage in Linux

I remember once reading that efficient system administrators are lazy people. The reason is not that they’re not doing their job or wasting their time – it is mostly because... Read more

Upgrading to Debian 8 (Jessie)

Upgrading to Debian 8 (Jessie) Debian 8 (Jessie) is the most recent version of Debian, released in April 2015. This guide explains how to upgrade your system from Debian 7... Read more

How to Check Bad Sectors or Bad Blocks on Hard Disk in Linux

Let us start by defining a bad sector/block, it’s a section on a disk drive or flash memory that can not be read from or written to anymore, as a... Read more

How to Use Conspy to View and Control Remote Linux Virtual Consoles in Real Time

Computer networks have made it possible for end users to interact one with another in several ways. They have also provided a way to perform remote work without the hassle... Read more

How To Secure Apache with Lets Encrypt on Ubuntu 18.04 VPS or dedicated server

Introduction Let’s Encrypt is a free, reliable, and automated Certificate Authority (CA) designed by the non-profit Internet Security Research Group (ISRG). The CA utilizes fully automated processes to deliver free... Read more

How To Configure Authentication and IIS 7.0 URL Authorization

In the former IIS versions, it was pretty difficult to carry out authorization. Due to the reason that IIS worked with only the identities of Windows. You would have to... Read more

How to Disable PHP Execution to Improve Website’s Security Using cPanel

Code injection through a backdoor has become so familiar, and millions of websites get hacked every year. It’s vital to do everything you can to protect your website. For a... Read more

8 Useful X-window (Gui Based) Linux Commands – Part I

We, the Tecmint Team is consistent in producing high quality articles of all kinds in Linux and Open-source domain. We have been working hard from the first day of our... Read more