Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Open Source Articles
Page 107 of 123
How to Disable Package Updates Using YUMDNF in RHEL Linux?
YUM/DNF is the package management system used in RHEL (Red Hat Enterprise Linux) and related distributions to install, update, and remove software packages. While keeping packages updated is generally recommended for security and stability, there are specific scenarios where temporarily disabling package updates becomes necessary to maintain system integrity. Why Disable Package Updates Several situations may require disabling package updates temporarily: Critical Applications − Production systems running mission-critical applications that require specific package versions Compatibility Requirements − Legacy software that may break with newer package versions Testing Environments − Development systems where consistent package versions are ...
Read MoreHow to Disable SSH Root Login in Linux?
SSH (Secure Shell) is a critical protocol used to remotely access and manage Linux servers securely. While SSH provides encrypted communication between clients and servers, allowing root login via SSH creates significant security vulnerabilities. The root user has complete system control, making unauthorized root access extremely dangerous for system integrity. This guide demonstrates how to disable SSH root login in Linux systems, reducing attack vectors and implementing security best practices for server administration. Security Risks of SSH Root Login Enabling root login via SSH exposes your system to several critical security threats: Brute Force Attacks ...
Read MoreHow to Disable Suspend and Hibernation Modes In Linux?
Suspend and hibernation modes are power management features in Linux that help conserve battery life and allow quick system recovery. However, there are situations where you might want to disable these features — such as preventing system instability, avoiding unexpected wake-ups on servers, or ensuring continuous operation of critical applications. Suspend mode puts your computer into a low-power state while keeping the session active in RAM. Hibernation mode saves the current system state to disk and completely powers down the machine. Both modes can sometimes cause issues with certain hardware configurations or interfere with system operations. Disabling Suspend ...
Read MoreHow to Disconnect Inactive or Idle SSH Connections in Linux?
Secure Shell (SSH) is a protocol that enables secure communication between two systems. In Linux, SSH is widely used to remotely access and manage servers. However, idle or inactive SSH connections can pose security risks and consume system resources unnecessarily. This article explains how to identify and disconnect such connections to maintain system security and performance. Identifying Inactive or Idle SSH Connections Before disconnecting inactive SSH connections, you must first identify them. Linux provides several commands to list active users, display session information, and monitor connection states. Using the 'who' Command The who command displays currently ...
Read MoreHow to Do Security Auditing of Linux System Using Lynis Tool?
In today's world, where cyber threats and attacks have become more sophisticated and frequent, it is imperative to secure computer systems against malicious activities. A security audit is a systematic evaluation of the security of a computer system or network, which involves identifying potential vulnerabilities and addressing them before they are exploited by attackers. In this article, we will discuss how to perform a security audit on a Linux system using the Lynis tool. What is Security Auditing? Security auditing refers to the process of evaluating the security posture of a computer system or network by examining its ...
Read MoreHow to Downgrade RHELCentOS to Previous Minor Release?
In the world of enterprise-level Linux operating systems, Red Hat Enterprise Linux (RHEL) and its derivative, CentOS, are two of the most widely used distributions. They offer a stable and robust platform that is trusted by many organizations worldwide. However, sometimes it may become necessary to downgrade to a previous minor release due to compatibility issues or other reasons. In this article, we will show you how to downgrade RHEL/CentOS to a previous minor release safely. Preparing for Downgrade Backing up data and configurations Before beginning the process of downgrading your RHEL/CentOS system, it is essential ...
Read MoreHow to Download and Install RHEL 9 for Free?
Red Hat Enterprise Linux (RHEL) is a popular distribution of the Linux operating system designed for enterprise use. It is widely used in data centers, cloud computing environments, and mission-critical applications due to its robustness, reliability, and scalability. RHEL 9, the latest major version released in May 2022, includes several new features and enhancements that make it an attractive option for businesses seeking a secure and stable operating system. Some key features of RHEL 9 include improved container capabilities with Podman and Buildah, enhanced security with OpenSCAP integration, better performance with XFS file system improvements, and simplified application development ...
Read MoreHow to Drop a Git Stash?
Git Stash is a powerful feature that allows developers to temporarily store uncommitted changes without creating a formal commit. This is particularly useful when you need to quickly switch branches or pull updates but have work-in-progress that isn't ready to be committed yet. However, over time you may accumulate multiple stashes that are no longer needed. Learning how to properly drop these stashes helps keep your repository clean and organized. What is Git Stash? Git stash is a command that saves your current working directory and staging area changes to a temporary storage area. Think of it ...
Read MoreHow to Edit Hosts File in Linux, Windows, or Mac?
Have you ever wondered how your computer connects to a website? The answer lies in the Domain Name System (DNS), which translates domain names into IP addresses. But did you know that you can actually edit this process by modifying your computer's hosts file? The hosts file is a simple text file that maps IP addresses to domain names, allowing you to bypass DNS and specify exactly where your computer should look for a website. This file exists on all operating systems and provides local DNS resolution before querying external DNS servers. Editing Hosts File in Linux ...
Read MoreHow to Configure Proxy Settings on Ubuntu 20.04?
Proxy servers are intermediary servers that act as a gateway between a user's device and the internet. When connected through a proxy server, all data requests are first sent to the proxy server which then forwards them to the internet. This setup provides enhanced security, privacy, and network control for organizations and individuals. There are several types of proxies including HTTP proxies, HTTPS proxies, and SOCKS proxies. Each type serves different purposes with varying degrees of security and functionality. Understanding Proxy Settings on Ubuntu 20.04 Ubuntu 20.04 provides multiple methods to configure proxy settings, allowing you to ...
Read More