Month: October 2017

4 Ways to Watch or Monitor Log Files in Real Time

How can I see the content of a log file in real time in Linux? Well there are a lot of utilities out there that can help a user to output the content of...

New SSL Notifications in v68

AutoSSL is indisputably one of the best parts of cPanel & WHM. We have continued to improve and expand the functionality of AutoSSL since we introduced it in version 58, and version 68 includes some very specific improvements we want to talk about. Building the best experience Much of our work with AutoSSL has been on improving the DCV (Domain Control Validation) process and success rates. While most of the work has been behind-the-scenes and not …

Get Certified Oracle Database Administrator Bundle: Lifetime Access

A database administrators (DBA) is an IT professional who uses specialized software such as Oracle database, an object-relational database management system, to store and organize data. With The Certified Oracle Database Administrator Bundle: Lifetime...

How to Run Shell Scripts with Sudo Command in Linux

sudo is a powerful command line tool that enables a “permitted user” to run a command as another user (the superuser by default), as defined by a security policy. On most if not all...

U

Understanding Shared Libraries in Linux

In programming, a library is an assortment of pre-compiled pieces of code that can be reused in a program. Libraries simplify life for programmers, in that they provide reusable functions, routines, classes, data structures...

The Linux Lifetime Mastery Bundle Course

Computer programming has become one of the most in-demand skills for IT professionals. But it all starts with a basic understanding of how computers work and here to get you started is the Pay...

Initial Ubuntu Server Setup for Beginners

This tutorial will guide you on the first basic steps you need to configure on a new installed Ubuntu server in order to increase security and reliability for your server. The configurations explained in...

H

How to Enable, Disable and Install Yum Plug-ins

YUM plug-ins are small programs that extend and improve the overall performance of the package manager. A few of them are installed by default, while many are not. Yum always notify you which plug-ins,...

EasyApache 3: It’s been a long road, but it will be time to say goodbye soon.

It’s that time. No, not breakfast, or lunch. It’s time that we are finally defining the End of Life for EasyApache 3.  EasyApache 3 will be fully deprecated, receiving no further updates as of December 31st, 2018. This date allows us to end support in line with PHP 5.6; the last PHP version in EasyApache 3. There’s a lot to …

Initial Server Setup and Configurations on RHEL 7

In this tutorial we’ll discuss the first configuration steps you need to take care of after a fresh installation of Red Hat Enterprise Linux 7 on a bare metal-server or on a Virtual Private...

The Different Applications for cPanel Webmail

* This post was originally published on December 23, 2015, and has been updated for technical accuracy.  Webmail is one of the most commonly used features in cPanel. As opposed to having email delivered from the server to a desktop application, Webmail allows users to check their messages from their browsers. Currently, there are three different Webmail applications available, each with their own subtle differences, but all with the same power to deliver secure email …

How to Lock User Accounts After Failed Login Attempts

This guide will show how to lock a system user’s account after a specifiable number of failed login attempts in CentOS, RHEL and Fedora distributions. Here, the focus is to enforce simple server security...

How to Enable or Disable SELinux Boolean Values

Security-Enhanced Linux (SELinux) is a security mechanism for mandatory access control (MAC) implemented in the Linux kernel. It is a flexible operation designed to boost overall system security: it enables access controls imposed using...

How to Fix “firewall-cmd: command not found” Error in RHEL/CentOS 7

firewall-cmd is a command line front-end for firewalld (firewalld daemon), a dynamic firewall management tool with D-Bus interface. It supports both IPv4 and IPv6; it also supports networks firewall zones, bridges and ipsets. It...

How to align your team around microservices

How to align your team around microservices

Microservices have been a focus across the open source world for several years now. Although open source technologies such as Docker, Kubernetes, Prometheus, and Swarm make it easier than ever for organizations to adopt microservice architectures, getting your team on the same page about microservices remains a difficult challenge.

read more

F

Flint OS, an operating system for a cloud-first world

Given the power of today’s browser platform technology and web frontend performance, it’s not surprising that most things we want to do with the internet can be accomplished through a single browser window. We are

How to Run Commands from Standard Input Using Tee and Xargs in Linux

While using the command line, you can directly pass the output of one program (for example a tool that generates some system information or statistics) as input for another program (such as text-filtering or...

File restoration in cPanel & WHM Version 68

Version 68 was released this week, and I want to talk to you about one of the most exciting new features: As both an end-user and as a server administrator you can now restore individual files from an account backup! Let’s take a look at how it works as of version 68. Step 1: Have available backups Before you can restore from an account backup, you must first have backups already made. To enable backups, go …

How to Make File and Directory Undeletable, Even By Root in Linux

On Unix-like operating systems including Linux, root is the account or user name that by default can modify all directories and files on a system. In this article, we’ll show how to make directories...

H

How To Protect Hard and Symbolic Links in CentOS/RHEL 7

In Linux, hard and soft links are referenced to files, which are very important, if not protected very well, any vulnerabilities in them can be exploited by malicious system users or attackers. A common...