• 50 Most Frequently Used UNIX / Linux Commands (With Examples)

    Tags: ,

    This article provides practical examples for 50 most frequently used commands in Linux / UNIX. This is not a comprehensive list by any means, but this should give you a jumpstart on some of the common Linux commands. Bookmark this article for your future reference. Did I miss any frequently used Linux commands? Leave a […]

    Read More
  • Linux Directory Structure (File System Structure) Explained with Examples

    Tags:

    Have you wondered why certain programs are located under /bin, or /sbin, or /usr/bin, or /usr/sbin? For example, less command is located under /usr/bin directory. Why not /bin, or /sbin, or /usr/sbin? What is the different between all these directories? In this article, let us review the Linux filesystem structures and understand the meaning of […]

    Read More
  • RAID 2, RAID 3, RAID 4, RAID 6 Explained with Diagram

    Tags:

    In most critical production servers, you will be using either RAID 5 or RAID 10. However there are several non-standard raids, which are not used except in some rare situations. It is good to know what they are. This article explains with a simple diagram how RAID 2, RAID 3, RAID 4, and RAID 6 […]

    Read More
  • RAID 0, RAID 1, RAID 5, RAID 10 Explained with Diagrams

    Tags:

    RAID stands for Redundant Array of Inexpensive (Independent) Disks. On most situations you will be using one of the following four levels of RAIDs. RAID 0 RAID 1 RAID 5 RAID 10 (also known as RAID 1+0) This article explains the main difference between these raid levels along with an easy to understand diagram. In […]

    Read More
  • 6 Stages of Linux Boot Process (Start-up Sequence)

    Tags:

    Press the power button on your system, and after few moments you see the Linux login prompt. Have you ever wondered what happens behind the scenes from the time you press the power button until the Linux login prompt appears? The following are the 6 high level stages of a typical Linux boot process. 1. […]

    Read More
  • How to Samba Network Recycle-Bin?

    Tags: ,

    Samba uses VFS (Virtual File System) Module for network recycle bin. Various modules VFS modules that samba can use are located at “/usr/lib/samba/vfs”. For Recycle purpose we are using recycle.so module. Use VFS object to the Shares for which Recycle-Bin is required as below: /etc/samba/smb.conf #========================================================== [SecAudi-RD] path = /Apps/Scripts public = yes writable = […]

    Read More
  • How to Prevent MySQL from data Spoofing?

    Tags:

    This article explains how to encrypt the clear text mysql data using stunnel. Definitely essential for those who have security as their top priority.Although this tool can be used to encrypt the data for other services like imap and pop, this article of mine basically explains the use of stunnel for mysql. Once learned , […]

    Read More
  • ”Changing Web Server Identity”

    Tags:

    The basic principle of launching an attack against any website is to first get maximum information about the website regarding the web server used at the backend or the modules that have been compiled along with it or something else.This process particularly known as web server fingerprinting or banner grabbing is the basic test module […]

    Read More
  • How to use Linux as Novell-Netware Client

    Tags:

    IPX Protocol: IPX stands for Internetwork Packet Exchange. It is a networking protocol used by the Novell NetWare operating systems. Like UDP, IPX is a datagram protocol used for connectionless communications. The IPX protocol stack is supported by Novell’s NetWare network operating system. Because of Netware’s popularity through the late 1980s into the mid 1990s, […]

    Read More
  • Protecting SAMBA PDC Share from viruses

    Tags:

    Generally domain controller share is used by a user to store its documents, spread sheets, presentations etc… etc.. If a user is a programmer, then he has to save executable file (*.exe, *.com, *.dll). But we know that files with such extensions are having more chances to get infected by viruses. For a normal user […]

    Read More