Home Blog

Linux / UNIX – Display the permissions of a file

0
Q. How do I list or display the permission of a file using ssh? I don’t have GUI installed on a remote Linux computer.A.You need...

Find out the spam mailing script’s location – Exim

1
The Exim mail server has a lot of options/commands to find out the details of spammers easily from the command line. Click this link...

List of cPanel Default Open Ports

0
This is a listing of all default open ports in cPanel server. You must open all of these ports in your server firewall to run...

Backup and Restore MySQL Database Using mysqldump

0
mysqldump is an effective tool to backup MySQL database. It creates a *.sql file withDROP table, CREATE table and INSERT intosql-statements of the source...

Unraveling the Mysteries of RAID Performance: A Comprehensive Guide

0
Choosing a RAID level is an exercise in balancing many factors, including cost, reliability, capacity, and performance. RAID performance can be challenging to understand,...

PHPMyAdmin – Unable to establish a PHP session

0
PHPMyAdmin error Have you ever come across the following error when you access PHPMyAdmin from cPanel. Access Denied Unable to establish a PHP session. If you believe...

6 Linux Crontab Command Examples

0
Crontab command manages the cron table that is used by the cron daemon to execute the cron jobs. This article explains the various command...

How to turn Off linux password expiration?

0
Question : How to turn off password expiration under Linux? Answer:The  Encrypted password list is stored  in /etc/shadow file cat /etc/shadow   root:$1$dkk&Iw6zvgu$P3ms0o5GiXv66BzNXe0:15294:0:99999:7:: This is the explanation of...

HowTo: Flush Contents Of a Memcached Server Using Command Line

0
I've installed memcached server under Linux but it is still showing old data. How do I flush the contents of a Memcached instance /...

Install Rkhunter

0
Overview rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of important...