How can I find hidden processes on my server? (linux)</p> The following line can be used to list out all running processes, regardless of whether or not they show up...
BASH Script Error Handling</p> You can catch errors returned by your commands in BASH shell scripts with "$?". In this example we will do a backup rsync of our home...
Here is how to do it in Linux:</p> Get an image file and an archive of the files that you want to hide. In this example, I have cat beer_and_cig.jpg...
A. You need to use uname command, which prints system information including kernel version and whether kernel is 32 bit or 64 bit. You can also use less /proc/cpuinfo command...
xargs: How To Control and Use Command Line Arguments</p> I am trying to use xargs command using shell pipes and not able to understand how to control and use command...
I would like to say thank you to ext3grep.</p> It helped me to restore all my files, as expected some manualintervention was required, but I managed to restore all without...
I admin a website and a lot of bogus traffic comes from countries that do not offer much in commercial value. How do I just configure Apache or iptables to...
Introduction</p> Snort—what's in a name? In the case of open source software, a powerful network-intrusion prevention and detection system. Snort was written over a weekend in 1998 by Martin Roesch....
KVM is a part of RHCVA study which is Red Hat Certified Virtualisation Administrator.It is a fully virtualised machine much better than XEN as we can store UNLIMITED number of...
Hi All,</p> Everyone who is using linux knows that while installation we can set grub a password.But if in case some one forgets to set a password for the same,then...
To split large file into several smaller files, you can use split command in linux. Just follow the steps below and you will be able to split large file into...
while configuration for apache , if we get an error like this :-</p> Apache Address already in use: make_sock: could not bind to port 80 error and solution Then chk...
Few basic things to keep in mind to secure network communications :</p> 1. Remove unneeded network services.: R-services such as rlogin, rdist, rexecd, rsh, and rcp are especially vulnerable to...
how i can get the real time when the command has been executed and not the logout time ?</p> Add following line in .bashrc file or .bashrc_logon HISTTIMEFORMAT="%h-%d-%Y - %H:%M:%S...
If you can't delete regular file with funny characters or space in the filename, then you can delete it using Inode Number.</p> find . -inum -exec rm -i {} \;</div>...