Found 2003 Articles for Operating System

Configuring Squid Proxy Server with Restricted Access and Setting Up Clients to Use Proxy

Mrudgandha Kulkarni
Updated on 26-Jun-2023 14:41:56

2K+ Views

Are you looking to configure a Squid Proxy Server with restricted access and set up clients to use the proxy? Look no further! In this article, I will guide you through the steps to configure Squid Proxy Server and set up clients to use the proxy. What is Squid Proxy Server? Squid Proxy Server is a popular open-source proxy server that can be used to improve network performance and security by caching and filtering web content. It can also be used to control access to the internet, allowing you to block or allow specific websites or categories of websites. Installing ... Read More

Configure Collectd as a Central Monitoring Server for Clients

Mrudgandha Kulkarni
Updated on 26-Jun-2023 14:40:52

535 Views

Collectd is a popular system statistics collection daemon that gathers and reports on a variety of system performance metrics such as CPU usage, memory usage, disk usage, and network traffic, to name a few. It is widely used to monitor systems and applications in real-time and helps to identify bottlenecks and performance issues. In this article, we will guide you through the process of configuring Collectd as a central monitoring server for clients, which allows you to collect and analyze data from multiple systems on a single server. Prerequisites Before we dive into configuring Collectd, you will need the following ... Read More

Configure _No Password SSH Keys Authentication_ with PuTTY on Linux Servers

Mrudgandha Kulkarni
Updated on 26-Jun-2023 14:36:21

532 Views

SSH (Secure Shell) is a popular protocol for securely connecting to remote servers over a network. When you use SSH to connect to a server, you typically need to provide a username and password to authenticate your identity. However, this process can be tedious if you need to connect to multiple servers frequently. Fortunately, there is a solution: No Password SSH Keys Authentication. In this article, we'll walk you through the process of setting up No Password SSH Keys Authentication on a Linux server using PuTTY, a popular SSH client for Windows. With this setup, you can connect to your ... Read More

Cockpit – A Powerful Tool to Monitor and Administer Multiple Linux Servers via Browser

Mrudgandha Kulkarni
Updated on 23-Jun-2023 12:56:33

1K+ Views

Managing multiple Linux servers can be a challenging task, especially for those who are new to the Linux environment. Luckily, there are several tools available that make this task easier, and one such tool is Cockpit. In this article, we will explore what is Cockpit, its features, how to install and configure it, and how to use it to manage your Linux servers. What is Cockpit? Cockpit is a powerful web-based graphical interface for managing and monitoring multiple Linux servers. It provides an easy-to-use and intuitive interface that allows system administrators to manage servers from a single location. With Cockpit, ... Read More

CloudBerry Backup for Linux_ Review and Installation

Mrudgandha Kulkarni
Updated on 23-Jun-2023 12:54:34

243 Views

Data loss is one of the biggest threats to businesses and individuals alike. Whether it’s due to hardware failure, accidental deletion, or cyber-attacks, losing important data can have serious consequences. That's why having a reliable backup solution is crucial for safeguarding your important data. In this article, we will provide a comprehensive review of CloudBerry Backup for Linux, including its features, benefits, and installation process. We will also provide working code examples and step-by-step instructions to help you get started with the software. By the end of this article, you'll have all the information you need to decide whether CloudBerry ... Read More

Cloud Connect User Guide

Mrudgandha Kulkarni
Updated on 23-Jun-2023 12:53:17

254 Views

If you're looking for a reliable way to back up your data to the cloud, then Veeam Cloud Connect is the solution for you. With Cloud Connect, you can easily send your data to a cloud-based backup repository managed by a Veeam service provider. In this article, we'll provide a comprehensive guide on how to use Cloud Connect, including installation, configuration, and backup. What is Cloud Connect? Veeam Cloud Connect is a cloud-based backup and disaster recovery solution designed to provide users with a secure, reliable, and efficient way to protect their data in the cloud. It allows businesses to ... Read More

Cheat - An Ultimate Command Line 'Cheat-Sheet' for Linux Beginners

Mrudgandha Kulkarni
Updated on 23-Jun-2023 12:51:53

520 Views

Linux is a powerful and flexible operating system used by developers, system administrators, and enthusiasts alike. However, learning Linux can be challenging, especially for beginners. There are many commands and tools to remember, and it can be overwhelming to keep track of them all. That's where Cheat comes in. Cheat is an open-source command-line utility that provides quick access to command-line cheatsheets. In this article, we will introduce you to Cheat and show you how to use it. What is Cheat? Cheat is a command-line utility that provides access to command-line cheatsheets for various Linux commands and tools. It is ... Read More

Centralized Secure Storage (iSCSI) - "Initiator Client" Setup on CentOS

Mrudgandha Kulkarni
Updated on 23-Jun-2023 12:49:16

284 Views

Centralized secure storage is an essential component of many modern IT infrastructures. It allows multiple servers to access a shared storage pool, enabling a higher degree of flexibility, scalability, and availability. One popular method of centralized secure storage is iSCSI (Internet Small Computer System Interface). In this article, we will guide you through the process of setting up an iSCSI initiator client on CentOS. What is iSCSI? iSCSI is a protocol that allows a server to access storage devices over a network. It encapsulates SCSI commands and data into IP packets, allowing the server to communicate with the storage device ... Read More

DCP – Transfer Files Between Linux Hosts Using Peer-to-Peer Network

Mrudgandha Kulkarni
Updated on 23-Jun-2023 12:47:44

1K+ Views

As a Linux user, you may often find yourself needing to transfer files between different hosts on your network. While there are several ways to do this, the Distributed Copy (DCP) protocol is a peer-to-peer method that offers a convenient and efficient solution. In this blog post, we will explore DCP in more detail, including how to install and use it to transfer files between Linux hosts. We will also discuss some of the security considerations when using DCP, and how to use SSH to ensure secure file transfers. What is DCP? DCP is a protocol that enables peer-to-peer file ... Read More

Database Relationship Types _ How They Are Established?

Mrudgandha Kulkarni
Updated on 23-Jun-2023 12:45:36

1K+ Views

Databases are at the core of many modern applications, and they allow developers to store and manipulate large amounts of data efficiently. One of the fundamental concepts in database design is the relationship between tables. In this article, we will explore the different types of database relationships and how they are established. Introduction to Database Relationships A database relationship is a link between two tables that defines how the data in the tables is related to each other. Relationships between tables are established using keys, which are unique identifiers that allow data to be connected across tables. There are three ... Read More

Advertisements