How To Create SSH Secure Communication Channel with Putty
http://www.howopensource.com/2014/10/creare-secure-communication-puttyImagine you are connected to public wireless network and want to check some admin panel that does not support HTTPS. Then you are...
View ArticleHow To Configure SSL In Tomcat
http://website-security.info/tomcat-java-sslTo secure the communication and increase the level of privacy to and from your Tomcat servlet container you should use SSL. Usually there's an Apache or...
View ArticleHow to monitor and troubleshoot a Linux server using sysdig
http://xmodulo.com/monitor-troubleshoot-linux-server-sysdig.htmlWhat is the first thing that comes to mind when you need to track system calls made and received by a process? You'll probably think of...
View ArticleNginx, SSL & php5-fpm on Debian Wheezy
http://www.iodigitalsec.com/nginx-ssl-php5-fpm-on-debian-wheezyI decided to take a break from my love affair with Apache and set up a recent development project on Nginx. I’ve seen nothing but good...
View ArticleHow to check hard disk health on Linux using smartmontools
http://xmodulo.com/check-hard-disk-health-linux-smartmontools.htmlIf there is something that you never want to happen on your Linux system, that is having hard drives die on you without any warning....
View ArticleWhat is good reference management software on Linux
http://xmodulo.com/reference-management-software-linux.htmlHave you ever written a paper so long that you thought you would never see the end of it? If so, you know that the worst part is not...
View ArticleHow to verify the authenticity and integrity of a downloaded file on Linux
http://xmodulo.com/verify-authenticity-integrity-downloaded-file.htmlWhen you download a file (e.g., an installer, an ISO image, or a compressed archive) from the web, the file can be corrupted under a...
View ArticleHow to create and use Python CGI scripts
http://xmodulo.com/create-use-python-cgi-scripts.htmlHave you ever wanted to create a webpage or process user input from a web-based form using Python? These tasks can be accomplished through the use...
View ArticleHow to monitor a log file on Linux with logwatch
http://xmodulo.com/monitor-log-file-linux-logwatch.htmlLinux operating system and many applications create special files commonly referred to as "logs" to record their operational events. These system...
View ArticleWhat is a good command-line calculator on Linux
http://xmodulo.com/command-line-calculator-linux.htmlEvery modern Linux desktop distribution comes with a default GUI-based calculator app. On the other hand, if your workspace is full of terminal...
View ArticleProgramming by Voice: Staying Productive without Harming Yourself
http://www.extrahop.com/post/blog/programming-by-voice-staying-productive-without-harming-yourselfOne of the reasons I love working at ExtraHop is the lack of meetings and abundance of uninterrupted...
View ArticleSUSE Linux – Zypper Command Examples
http://www.linuxtechi.com/suse-linux-zypper-command-examplesZypper is command line interface in SuSE Linux which is used to install, update, remove software, manage repositories, perform various...
View ArticleWhat are useful Bash aliases and functions
http://xmodulo.com/useful-bash-aliases-functions.htmlAs a command line adventurer, you probably found yourself repeating the same lengthy commands over and over. If you always ssh into the same...
View ArticleAmazing ! 25 Linux Performance Monitoring Tools
http://linoxide.com/monitoring-2/linux-performance-monitoring-toolsOver the time our website has shown you how to configure various performance tools for Linux and Unix-like operating systems. In this...
View ArticleIntegrating Trac, Jenkins and Cobbler—Customizing Linux Operating Systems...
http://www.linuxjournal.com/content/integrating-trac-jenkins-and-cobbler—customizing-linux-operating-systems-organizational-need Organizations supporting Linux operating systems commonly have a need to...
View Article5 Deadly Linux Commands You Should Never Run
http://www.theepochtimes.com/n3/1031947-5-deadly-linux-commands-you-should-never-runAs a Linux user, you probably have searched online for articles and tutorials that show you how to use the terminal...
View ArticleUnix: Beyond owner, group, and everyone else
http://www.itworld.com/article/2838785/unix-beyond-owner-group-and-everyone-else.html The standard way of assigning file permissions on Unix systems is so tied into how people think of Unix that many...
View ArticleHow to encrypt files and directories with eCryptFS on Linux
http://xmodulo.com/encrypt-files-directories-ecryptfs-linux.htmlYou do not have to be a criminal or work for the CIA to use encryption. You simply don't want anybody to spy on your financial data,...
View ArticleHow to create and manage LXC containers on Ubuntu
http://xmodulo.com/lxc-containers-ubuntu.htmlWhile the concept of containers was introduced more than a decade ago to manage shared hosting environments securely (e.g., FreeBSD jails), Linux containers...
View ArticleA hitchhikers guide to troubleshooting linux memory usage
http://techarena51.com/index.php/linux-memory-usageLinux memory management has always intrigued me. While learning Linux, many concepts are confusing at first, but after a lot of reading, googling,...
View Article