Understanding Special Permission SGID in Linux
In my earlier posts I had explained about other Special Permission used in Linux i.e. SUID and STICKY BITSo let me help you understand SGID and its usage with some practical examples.SGID:This is an...
View ArticleSetting up custom TCP/IP Keep Alive Parameter in Linux
Why do we use Keep Alive parameter ?I guess the name itself explains the 90% of the definition and the rest let me try to explain you.Now many a times most of you have been in a situation when you are...
View ArticleChanging password for Administrator in Samba4
Now when you have a successful running Samba4 domain server, you might come across a time when you will have to change the Administrator password. Let me show you the steps to do the same:Let us verify...
View ArticleChanging default snapshot location in VMware ESXi
Be default the snapshots which are taken for any vm are stored with their parent in the same directory or storage. Sometimes you may run out of space and you might not be able to take anymore snapshots...
View ArticleHanging up active calls in Asterisk PBX
In case your PBX server has too mane active calls and channels and you want to do a soft hangup for some of the calls then this is what you need to do.Login to your asterisk CLI console...
View ArticleAccess denied for user 'root'@'localhost' (using password: NO)
This error pops us mostly while trying to access your MYSQL databaseResolution: [root@server ~]# /etc/init.d/mysqld stop Stopping MySQL: [ OK ] [root@server ~]#...
View ArticleHow to get a list of open ports in Linux?
So you have set up a very secured server but still don't you want to cross check if the machine is really secured and your server has not been compromised by anyone. If is always better to regularly...
View ArticleUsing audit in Linux to track system changes and unauthorized access
The 2.6 Linux kernel has the ability to log events such as system calls and file access. These logs can then be reviewed by the administrator to determine possible security breaches such as failed...
View ArticleConfiguring CVS server in Linux
From wiki CVS (Concurrent Versions System)uses a client–server architecture: a server stores the current version(s) of a project and its history, and clients connect to the server in order to "check...
View ArticlePreventing security breaches with ExecShield
ExecShield is designed to prevent security breaches caused by software programs written to crawl through the Internet looking for systems with common vulnerabilities such as worms and viruses. It is...
View Article/www/bin/apxs: No such file or directory
The other day I was trying to compile php in one of my Linux machine and this error threw up. Well then I thought let me provide a solution for this on my blog as well.This error comes when you are...
View ArticleHow to create MySQL Database, Tables in Linux
I have used Red Hat Linux for creating MySQL database so kindly make changes in the commands as per your distribution.Installing MySQL.Make sure mysql package is installed in your machine which you can...
View ArticleHow to create a MySQL database USER and ASSIGN PRIVILEGE
Creating a database user and system user are two different things. In this post I will be telling you the steps required to create a MySQL database user and assigning privilege.For installing and...
View ArticleHow to create Soft Link and Hard Link in Linux
Well before moving ahead I hope you know about Symlinks in Linux and its both the types i.e Soft Link and Hard Link. I will just give a brief description on both the types of link.Soft LinkUsing this...
View Articlestat=Deferred: Connection timed out
I got this error while trying to send out mail using my MTA which in my case was sendmail.Solution:If you receive this error then it means that your mail server is unable to connect to your smtp...
View ArticleSendmail: Temporary Auth Failure
While configuring my sendmail server I was getting this error. I had to dig up a lot to fix this one. Then I found the solution so I thought I should share this on my blog as well.Solution:This happens...
View ArticleUnderstanding RPM package
All of us install multiple rpms while working on our Linux machines. But do you look at the rpm fileand ever wonder what does those i586, i686 or any other used similar attributes mean?Let me help you...
View ArticleSamba 4.1 as Active Directory
In my earlier post I had shown you the steps to install and configure Samba 4.0 but since then the Samba4 developers have upgraded the Samba version from 4.0 to 4.1. I will be releasing my post for...
View ArticleOracle database 10gR2 installation in RedHat 5.4
In this post I'll show you the steps required to install Oracle Database 10g Release 2 on Red Hat Enterprise Linux 5.4 (64-bit)Assuming you have downloaded Oracle Database 10g R2 from their official...
View ArticleXlib: No protocol specified
While installing Oracle database I was getting this error. I searched various blogs and forums and found out many solutions but lastly I got one solution which worked for me.But well I will post all...
View Article