A proxy server is a device that usually sits between a client and the destination the user is trying to reach. It can provide security, anonymity, and...
Apache is a solid and stable web server that has been around for years. Apache can also be used to host multiple websites at a single time through the...
The VNC server allows you to remote into the user’s system and view her desktop. With the end user’s desktop in view, you can more easily troubleshoot...
Secure your SSH connection is very important. I guess that you don’t want your password being hacked, right? There are some tips that can help you to...
Backup your Linux OS is the first thing I want to do after installing my Linux machine and necessary softwares. You can install your OS again but it takes...
Security Enhanced Linux (SELinux) is another layer of security for the Linux OS. Instead of turning it off, however, you could use SELinux in “permissive”...
Network address translation (NAT) allows you to use a server as a gateway to a subnet, essentially controlling what goes in and out of your network. Suppose...
Kickstart server enables you to install Linux over the network via the HTTP, FTP, or NFS protocols. I choose to use the HTTP protocol here because it...
Linux is truly just the kernel. Red Hat and the other distributions in existence today are software and configuration files packaged with the Linux kernel...
Every time a program or command is run, a process is created for it. These processes are all unique and identified by the process identification (PID)...
The Lightweight Directory Access Protocol (LDAP) is an application protocol for accessing and maintaining distributed directory information services over...
Whenever something goes wrong – and sometimes when things go right – on the system, a message is generated by the syslog service. In all seriousness,...
Group Collaboration is an essential part of any system administrator who deals with users. Knowing file and directory permissions will allow you to let...
In Red Hat, there are three different types of user accounts: root, normal user and system. The root account is the equivalent of the Administrator or...
TeamViewer connects to any PC or server around the world within a few seconds. You can remote control your partner's PC as if you were sitting right in...
It’s common for system administrators to create their own repositories where they keep not only a copy of Red Hat (or CentOS) packages, but also their...
A key skill for a system administrator is being able to deploy your own custom software. However, you first need to build an RPM package that contains...
In Red Hat, the popular package used for installation usually have the .rpm extension and can be installed through different means. Before starting to...
The key component to network troubleshooting is making sure that everything is working smoothly and that your network is functioning properly. There are...
The benefit of this is that remote resources can be mounted automatically and without the need for the root user to perform the mount. This is done through...
A disk quota is a limit set by a system administrator that restricts certain aspects of file system usage on modern operating systems. The function of...
Linux, like most operating systems, has a standard set of file permissions. Aside from there, it also has more refined set of permissions implemented...
Linux Unified Key Setup, or LUKs, is a disk encryption for Linux. LUKs uses block device encryption, which protects the system when it is off (particularly...
I recently tried to convert CHM (Windows Help File) to PDF. There're many methods to achieve this. Now I give you an easiest way to make your PDF file...
After setting up the layout of the different disks for the system. Now to be able to use these disks, we need to create a file system for each one, mount...
Onion Proxy Server allows users of the Tor network to make anonymous outgoing connections via TCP. The key advantage that Tor has over other anonymity...
The system uses swap space as type of “virtual memory” for when your physical memory begins to run low. It does this by using piece of disk storage to...
On any system it is important to manage the running services. Managing services enables you to ensure the stability and reliability that your system will...
When the system boots up, it queries for the default runlevel, which is defined in the /etc/inittab file. When that default runlevel is located, the system...