Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Operating System Articles - Page 63 of 179
1K+ Views
If you're looking for a lightweight and customizable Linux distribution, Bodhi Linux is definitely worth checking out. This operating system is based on Ubuntu and uses the Enlightenment desktop environment, which provides a sleek and minimalistic interface. In this guide, we'll go through the steps to install Bodhi Linux on your computer. We'll cover the requirements, the installation process, and some tips to get started with your new Bodhi Linux system. Requirements Before installing Bodhi Linux, you'll need to make sure your computer meets the following requirements − A 64-bit processor At least 512 MB of RAM (1 GB ... Read More
2K+ Views
DHCP (Dynamic Host Configuration Protocol) is a networking protocol that allows automatic configuration of IP addresses and network settings for devices on a network. It eliminates the need for manual configuration of IP addresses and saves time and effort. In this article, we will guide you through the process of installing a DHCP server in CentOS, RHEL, and Fedora. Install DHCP Server Package To install the DHCP server package, open a terminal window and run the following command − sudo yum install dhcp This command will install the DHCP server package along with all the required dependencies. Configure DHCP ... Read More
22K+ Views
Ubuntu is a popular Linux distribution that is widely used for its reliability and security. One of the main advantages of using Ubuntu is that it is available in two versions: desktop and server. The desktop version comes with a graphical user interface (GUI), which makes it easy to use for beginners. On the other hand, the server version does not have a GUI, as it is designed for advanced users who prefer to work from the command line. However, in some cases, you may want to install a GUI on an Ubuntu server to make it easier to manage. ... Read More
1K+ Views
If you're looking for a reliable and secure server operating system, Debian 10 (Buster) is an excellent choice. It's known for its stability, security, and open-source nature. In this article, we'll show you how to install a Debian 10 minimal server, which is a stripped-down version of the operating system without any graphical user interface or unnecessary software. A minimal server is an excellent option for those who want to build a custom server tailored to their specific needs. Before we begin, it's essential to note that installing a Debian 10 minimal server requires some technical knowledge. You'll need to ... Read More
1K+ Views
Mumble is an open-source, low-latency, high-quality, voice chat software primarily designed for online gaming communities. It is designed to provide a secure, reliable, and scalable communication system for users. Mumble has two components, the client software that users install on their machines, and the server software that runs on a dedicated server. In this article, we will discuss how to install and set up a Mumble server, commonly referred to as Murmur, on Linux CentOS 7. Prerequisites Before we start with the installation process, we need to ensure that the following prerequisites are met − A Linux CentOS 7 ... Read More
5K+ Views
If you're looking to enable OpenSSH on CentOS 7, you've come to the right place. In this article, we'll take a look at the steps you need to follow to install and enable OpenSSH on your CentOS 7 machine. We'll also take a look at some of the benefits of using OpenSSH and how to configure it to suit your needs. What is OpenSSH? OpenSSH is a secure shell protocol used to establish a secure connection between two computers over a network. It's an open-source version of the Secure Shell (SSH) protocol, which is widely used to provide secure remote ... Read More
2K+ Views
If you're looking for a reliable and robust firewall solution for your network, IPFire might be the answer. IPFire is a free and open-source Linux distribution that provides enterprise-level security features, including a stateful inspection firewall, intrusion detection and prevention, virtual private networking (VPN), and more. In this article, we will guide you through the steps to install IPFire on your network. Before we get started, let's make sure that your system meets the minimum requirements for IPFire − A 64-bit processor At least 512 MB of RAM At least 4 GB of storage If your system meets these ... Read More
742 Views
As a Linux user, you know how important it is to monitor your system's logging activity. With the vast number of processes that run on your Linux system, it can be difficult to keep track of everything that's going on. Fortunately, there's a tool called "atop" that can help you monitor your system's logging activity. In this article, we'll guide you through the process of installing and using atop on your Linux system. What is Atop? Atop is a Linux performance monitoring tool that allows you to view real-time system and process-level performance statistics. It provides a comprehensive overview of ... Read More
1K+ Views
Memcached is a distributed memory object caching system that can significantly improve the performance of your website or application by storing frequently accessed data in memory, reducing the number of database queries required. In this article, we will guide you through the process of installing and configuring Memcached on CentOS 8. Step 1: Install Memcached on CentOS 8 The first step is to install Memcached on your CentOS 8 system. You can do this by running the following command − sudo dnf install memcached This command will download and install Memcached on your system. Step 2: Start Memcached and ... Read More
47K+ Views
Secure Shell (SSH) is a widely used protocol for accessing remote systems securely. It is used to establish a secure and encrypted connection between two computers over an insecure network. When establishing an SSH connection, there is a timeout value that determines how long the connection can be idle before it is closed. This is called the SSH connection timeout. The SSH connection timeout is essential to prevent unauthorized access and to reduce the risk of security breaches. However, it can be a hassle when you need to work on a remote system for an extended period. In this article, ... Read More