History of Linux

In 1969, Four programmer Ken Thompson, Dennis Ritchie, Rudd Canady & Doug McElroy made a program in Bell labs which does not have any name in year 1969. Brian Kernighan checked that program & found it is very good software for client & networking purpose. [Read More]

Red Hat Cluster Notes

1) Cluster types: – High Availability / Failover cluster (Ideal for Database, file servers) – Load Balancing  (Ideal for high load web traffic) – High Performance (Large computational problems) 2) Clustering can be implemented in two ways . – Active – Active ( Both nodes [Read More]

Why do hackers prefer Linux?

  Also in today’s open source roundup: The best Linux desktop for customization, and how Star Trek inspired people with technology Why do hackers prefer Linux? Linux has much to offer any computer user, but it has proven to be particularly popular with hackers. A [Read More]

LOGICAL VOLUME MANAGER

1. Why LVM is required ? LVM stands for Logical Volume Manager , to resize filesystem’s size online we required LVM partition in Linux. Size of LVM partition can be extended and reduced using the lvextend & lvreduce commands respectively. 2. Is it possible to [Read More]

Linux Server Tips

1. Proxy Server and its use. A proxy server is a computer server which gives the client system an indirect access to spme other network or service. A client connects to the proxy and requests connection, file, services available on a different server. The proxy [Read More]

Redhat Linux Security Tips

New Features and Options of Firewalld ===================================== As All you know that Centos/Redhat 7 is Using by Default Service as Firewalld instead of Iptables. Now To Block all incoming and Outgoing Connection from your server ----------------------------------------------------------------- 1. Check your Firewalld Service ================================ [root@desktop87 ~]# systemctl [Read More]

Linux Important Facts

1. What is Linux Kernel? Linux Kernel is a low-level systems software whose main role is to manage hardware resources for the user  and to provide an interface for user-level interaction. 2. What is BASH? BASH is short for Bourne Again SHell. It was written [Read More]