Linux Conquering Cloud
Learn .. Conquer .. Share
Pages
(Move to ...)
Home
▼
Showing posts with label
COMMANDS
.
Show all posts
Showing posts with label
COMMANDS
.
Show all posts
Saturday, May 18, 2024
Using mdadm to Manage RAID and Multipath Storage on Linux: A Practical Guide with Examples
›
The mdadm command is a powerful tool for managing multiple device sets on Linux systems. It plays a crucial role in creating and maintaini...
Google Apps Wizard cPanel plugin
›
This tool was developed for web hosting companies, webmasters and website developers that have to setup domains with Google Apps in the ever...
Lynis: Elevate Your Server Security with a Powerful Auditing Tool
›
In the ever-evolving landscape of cybersecurity, proactive security measures are paramount. One tool that can significantly bolster your s...
Thursday, May 9, 2024
Resolving SAR Error: "Cannot open /var/log/sa/sa08"
›
System Activity Reporter (SAR) is a powerful tool for monitoring system performance, but encountering errors can be frustrating. One common ...
3 comments:
Sunday, May 5, 2024
Resetting the Root Password in Rescue Mode: A Step-by-Step Guide
›
In critical situations where access to your server's root account is lost or compromised, resetting the root password becomes essential ...
Friday, April 26, 2024
Bash Shell Scripting
›
These tutorials cover various aspects of bash shell scripting, starting with basic script creation and execution, then progressing to more a...
Inode space issue , finding largest inode entry direcotry
›
To find the directory with the largest inode entry, you can use the following command: For example: sudo find / -xdev -printf '%h\n'...
Understanding the Boot Process in Redhat Linux & CentOS 5&6
›
The boot process in Redhat Linux and CentOS involves several stages, each responsible for initializing different components of the system. H...
Thursday, December 28, 2023
Mastering Packet Analysis with Tcpdump - Packet Analysing.
›
Tcpdump is a powerful command-line packet analyzer tool used for network troubleshooting and analysis. It allows the user to intercept and d...
›
Home
View web version