Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Mrudgandha Kulkarni
Page 9 of 14
DCP – Transfer Files Between Linux Hosts Using Peer-to-Peer Network
As a Linux user, you may often find yourself needing to transfer files between different hosts on your network. While there are several ways to do this, the Distributed Copy (DCP) protocol is a peer-to-peer method that offers a convenient and efficient solution for large-scale file transfers. In this article, we will explore DCP in detail, including how to install and use it to transfer files between Linux hosts. We will also discuss security considerations when using DCP, and how to use SSH to ensure secure file transfers. What is DCP? DCP is a protocol that enables ...
Read MoreCentralized Secure Storage (iSCSI) - \"Initiator Client\" Setup on CentOS
Centralized secure storage is an essential component of many modern IT infrastructures. It allows multiple servers to access a shared storage pool, enabling higher flexibility, scalability, and availability. One popular method is iSCSI (Internet Small Computer System Interface), which enables servers to access remote storage over IP networks as if it were locally attached. What is iSCSI? iSCSI is a protocol that encapsulates SCSI commands and data into IP packets, allowing servers to communicate with remote storage devices over standard Ethernet networks. This creates a Storage Area Network (SAN) using existing network infrastructure, making it cost-effective compared to ...
Read MoreCheat - An Ultimate Command Line \'Cheat-Sheet\' for Linux Beginners
Linux is a powerful and flexible operating system used by developers, system administrators, and enthusiasts alike. However, learning Linux can be challenging, especially for beginners. There are numerous commands and tools to remember, and it can be overwhelming to keep track of them all. That's where Cheat comes in − an open-source command-line utility that provides quick access to command-line cheatsheets. What is Cheat? Cheat is a command-line utility that provides access to command-line cheatsheets for various Linux commands and tools. It is written in Python and available on GitHub. Cheat is incredibly lightweight and easy to use, ...
Read MoreCloud Connect User Guide
Veeam Cloud Connect is a cloud-based backup and disaster recovery solution that allows organizations to extend their existing Veeam infrastructure to secure, service provider-managed cloud repositories. This comprehensive guide covers installation, configuration, and backup management to help you leverage Cloud Connect for reliable data protection. What is Cloud Connect? Veeam Cloud Connect enables businesses to send backup data to cloud-based repositories managed by certified Veeam service providers. It seamlessly integrates with existing Veeam Backup & Replication infrastructure, providing an offsite backup destination without the complexity of managing cloud storage directly. The solution supports both backup-to-cloud and replication-to-cloud scenarios. ...
Read MoreCloudBerry Backup for Linux_ Review and Installation
Data loss is one of the biggest threats to businesses and individuals alike. Whether it's due to hardware failure, accidental deletion, or cyber-attacks, losing important data can have serious consequences. That's why having a reliable backup solution is crucial for safeguarding your important data. In this article, we will provide a comprehensive review of CloudBerry Backup for Linux, including its features, benefits, and installation process. We will also provide working code examples and step-by-step instructions to help you get started with the software. What is CloudBerry Backup for Linux? CloudBerry Backup for Linux is a backup software ...
Read MoreCockpit – A Powerful Tool to Monitor and Administer Multiple Linux Servers via Browser
Managing multiple Linux servers can be a challenging task, especially for those who are new to the Linux environment. Luckily, there are several tools available that make this task easier, and one such tool is Cockpit. In this article, we will explore what Cockpit is, its features, how to install and configure it, and how to use it to manage your Linux servers effectively. What is Cockpit? Cockpit is a powerful web-based graphical interface for managing and monitoring multiple Linux servers. It provides an easy-to-use and intuitive interface that allows system administrators to manage servers from a ...
Read MoreConfigure _No Password SSH Keys Authentication_ with PuTTY on Linux Servers
SSH (Secure Shell) is a popular protocol for securely connecting to remote servers over a network. When you use SSH to connect to a server, you typically need to provide a username and password to authenticate your identity. However, this process can be tedious if you need to connect to multiple servers frequently. Fortunately, there is a solution: No Password SSH Keys Authentication. In this article, we'll walk you through the process of setting up No Password SSH Keys Authentication on a Linux server using PuTTY, a popular SSH client for Windows. With this setup, you can connect to ...
Read MoreConfigure Collectd as a Central Monitoring Server for Clients
Collectd is a lightweight system statistics collection daemon that gathers performance metrics such as CPU usage, memory utilization, disk I/O, and network traffic. It operates as a central monitoring solution, allowing administrators to collect data from multiple client systems and analyze it from a single server location. This article demonstrates how to configure Collectd as a central monitoring server to collect metrics from distributed client machines and visualize the data using modern dashboards. Prerequisites Before configuring Collectd, ensure you have the following − A server running Linux (Ubuntu or Debian preferred) One or more client ...
Read MoreConfiguring Squid Proxy Server with Restricted Access and Setting Up Clients to Use Proxy
Are you looking to configure a Squid Proxy Server with restricted access and set up clients to use the proxy? Squid is a powerful caching proxy server that provides network performance optimization, security filtering, and access control capabilities for organizations. What is Squid Proxy Server? Squid Proxy Server is a popular open-source proxy server that improves network performance and security by caching and filtering web content. It acts as an intermediary between clients and web servers, allowing administrators to control internet access, block specific websites, and monitor network traffic. Installing Squid Proxy Server Install Squid Proxy ...
Read MoreCpustat – Monitors CPU Utilization by Running Processes in Linux
Cpustat is a command-line utility for monitoring CPU utilization by running processes in Linux. It allows users to view the amount of CPU time being used by individual processes and groups of processes, providing insights into how system resources are being utilized. With Cpustat, users can identify processes that are consuming too much CPU time and take action to optimize system performance. Installing Cpustat Cpustat is available for most Linux distributions and can be installed using the package manager. On Debian/Ubuntu, use the following command to install − sudo apt-get install cpustat On Fedora/CentOS, ...
Read More