Linux Articles

Page 13 of 134

Secure Apache with Let\'s Encrypt Certificate on Rocky Linux

Ayush Singh
Ayush Singh
Updated on 17-Mar-2026 299 Views

To secure Apache with a Let's Encrypt certificate on Rocky Linux, administrators can guarantee secure communication over HTTPS. By obtaining and installing a Let's Encrypt certificate, Apache can encrypt data transmission, enhancing security and protecting sensitive information. This process involves configuring Apache to utilize the certificate, enabling HTTPS for the website, and ensuring that all communication between the server and clients is encrypted. Let's Encrypt certificates are trusted by major browsers, providing a cost-effective and widely recognized solution for securing Apache web servers on Rocky Linux. Prerequisites Before beginning the certificate installation process, ensure the following requirements are ...

Read More

Secure Files/Directories using ACLs (Access Control Lists) in Linux

Ayush Singh
Ayush Singh
Updated on 17-Mar-2026 320 Views

Access Control Lists (ACLs) in Linux provide a flexible and granular way to secure files and directories beyond traditional Unix permissions. While standard permissions only allow setting access for owner, group, and others, ACLs enable administrators to assign specific permissions to individual users and groups simultaneously. This allows fine-grained control over access rights using commands like setfacl and getfacl to define read, write, and execute permissions for multiple entities. How ACLs Work ACLs extend the basic Unix permission model by maintaining additional permission entries for files and directories. Each ACL entry specifies a user or group and their ...

Read More

Secure ProFTPD Connections Using TLS/SSL Protocol on RHEL/CentOS 7

Ayush Singh
Ayush Singh
Updated on 17-Mar-2026 367 Views

Secure ProFTPD Connections Using TLS/SSL Protocol on RHEL/CentOS 7 involves implementing Transport Layer Security (TLS) and Secure Sockets Layer (SSL) encryption for secure data transmission over ProFTPD, a popular FTP server program. By configuring ProFTPD to use TLS or SSL, communication between the FTP client and server is encrypted, ensuring confidentiality and integrity of the data being exchanged. This level of security protects sensitive information, such as login credentials, from being intercepted or modified by unauthorized parties. TLS/SSL certificates are used to establish secure connections and authenticate the server, building trust between the client and the FTP server. Methods ...

Read More

Securing SSH, Setting Hostname and Enabling Network Services

Ayush Singh
Ayush Singh
Updated on 17-Mar-2026 156 Views

Securing SSH involves changing the default SSH port, implementing strong authentication methods, and disabling root login. Setting a hostname helps with system identification and network organization. Enabling network services such as firewalls and intrusion detection systems provides comprehensive security coverage. These practices significantly enhance SSH server security and reduce vulnerability to unauthorized access attempts. SSH Security Configuration SSH security begins with modifying the default configuration. The primary steps include changing the default port from 22 to a non-standard port, implementing key-based authentication, and restricting user access. Step 1: Install OpenSSH Server sudo apt-get update sudo ...

Read More

Send a curl DELETE Request {With Example}

Ayush Singh
Ayush Singh
Updated on 17-Mar-2026 2K+ Views

The curl DELETE request is an HTTP method that allows the removal of a specified resource from a server. It is commonly used to delete data or content from web services or APIs. The DELETE request requires the URL of the resource to be removed, and additional headers or parameters can be included if needed. When the server receives the DELETE request, it processes the request and removes the desired resource if it exists. A successful DELETE request typically returns an HTTP status code indicating the successful removal of the resource. DELETE Request Method The DELETE request method ...

Read More

Server Automation Guide

Ayush Singh
Ayush Singh
Updated on 17-Mar-2026 269 Views

Server automation is a comprehensive approach for streamlining and optimizing server administration through automated tools and techniques. This guide focuses on the strategic use of automation tools to eliminate repetitive tasks, improve efficiency, and reduce human errors in server operations. By automating various aspects such as configuration management, software updates, provisioning, and monitoring, organizations can improve scalability, ensure consistent server environments, and achieve faster response times. How Server Automation Works Server automation operates through two fundamental approaches: imperative and declarative. In the imperative approach, a sequence of commands is executed step-by-step to instruct the system on how ...

Read More

Server Operating Systems: Server OS Types & How to Choose

Ayush Singh
Ayush Singh
Updated on 17-Mar-2026 636 Views

A server operating system is a specialized software designed to manage and control server resources, facilitating smooth operations by handling tasks such as data storage, user access, security, and network management. Unlike desktop operating systems, server OS platforms are optimized for high performance, scalability, and multi-user environments. They ensure efficient communication between client devices and servers, enabling seamless sharing of information and services across networks. Types of Server Platforms Different server types require specific operating system features and configurations − Web servers − Host websites and web applications, responding to HTTP requests from browsers. Common examples ...

Read More

How to List the Last Five Modified Files in Linux?

Kunal Verma
Kunal Verma
Updated on 17-Mar-2026 16K+ Views

In Linux, it is often necessary to find out the most recently modified files for various reasons, such as troubleshooting or auditing purposes. Listing the last five modified files is a common requirement that can be achieved using various Linux commands. This article explores multiple methods to accomplish this task efficiently. Note − Linux commands are case-sensitive. Using ls Command The ls command is one of the most commonly used commands in Linux to list files and directories. We can use the ls command to list the files in a directory sorted by modification time using the ...

Read More

How to Monitor Disk IO in a Linux System

Kunal Verma
Kunal Verma
Updated on 17-Mar-2026 716 Views

Disk monitoring is a critical task for maintaining optimal performance in Linux systems. The disk I/O subsystem is often the slowest component and can become a bottleneck that affects overall system performance. When processes wait for I/O operations to complete, it directly impacts system responsiveness. Effective disk monitoring helps identify which processes are causing I/O bottlenecks and determines the root cause of performance issues. In this article, we'll explore essential tools like iostat and iotop to monitor disk I/O performance in Linux systems. Installing iotop The iotop tool is available in most Linux distribution repositories and can ...

Read More

ServerMania - Discover High Availability Cloud Computing, powered by OpenStack

Ayush Singh
Ayush Singh
Updated on 17-Mar-2026 155 Views

ServerMania is a leading cloud computing provider that leverages OpenStack, an open-source cloud platform, to deliver highly available, redundant, and cost-effective private and public cloud solutions. The company specializes in providing dedicated servers and cloud hosting services with exceptional uptime, modern infrastructure, and superior customer support. ServerMania harnesses the full power of OpenStack technology to enable rapid cloud server deployment and offers streamlined, customized server management solutions. Their IT infrastructure supports instant provisioning of cloud servers, virtual private servers, dedicated servers, and web hosting solutions that can be deployed in as little as 5 minutes. The company operates modern ...

Read More
Showing 121–130 of 1,338 articles
« Prev 1 11 12 13 14 15 134 Next »
Advertisements