How to Reset the MySQL Root Password

How to Install MongoDB on CentOS 8 Linux

Nginx Tutorial

Trending Now


Latest Trending
Featured Trending
Staff Picks

Creating a config file and using it in tandem with your scripts

In this article, we are going to create a config file and use it in our shell script.PrerequisitesBesides having a terminal open, you need basic knowledge of creating scripts and config files.Write scriptNow, we are going to create a script and config file. The...

Calculating and reducing the runtime of a script

In this article, we are going to learn how to calculate and reduce the script’s runtime. A simple time command will help in calculating the execution time.PrerequisitesBesides having a terminal open, make sure you have the necessary scripts present in your...

Using Bash to monitor battery life and optimize it

In this article, we will learn about the TLP Linux tool. TLP is a command-line tool; it is used for power management and will optimize the battery life.PrerequisitesBesides having a Terminal open, you need to ensure that you have TLP installed on your system.How to do...




Latest Articles from Blog

Creating and configuring cron Jobs for task scheduling in Linux

In this article, we are going to learn how to configure Cron Jobs. We are going to use crontab to set up a Cron Job.Configure Cron Open your terminal and go to the /etc folder and check the /cron folders. You will see the following cron folders: /etc/cron.hourly...

Write a bash script accessing SQL databases remotely or locally

In this article, we are going to learn how to automate SQL queries by connecting to a server using a shell script. Bash scripting is used for automating things.PrerequisitesMake sure that mysql, postgres, and sqlite are installed. Ensure that the user is created...

Using Linux iptables for a firewall

In this article, we are going to set up a firewall using iptables. iptables is the standard firewall software present in most Linux distributions. We are going to use these set of rules to filter the network traffic. You can protect the server from unwanted traffic by...

Rotating files from RAM to storage for log rotation in Linux

In this article, we are going to discuss the logrotate Linux tool. Using this tool, administration of systems becomes easy. The systems generate large number of log files. This allows for automatic rotation, removal, compression, and mailing of log files. We can...

Compressing and archiving files in Linux Operating System

There is a difference between a compressed and an archive file. So, what is an archive file? It is a collection of files and directories that are stored in a single file. An archive file is not a compressed file. What is a compressed file? This is a collection of...

Write a bash script to monitoring directories and files

inotify is a tool in Linux which is used to report when a file system event occurs. Using inotify, you can monitor individual files or directories.PrerequisitesMake sure you have the inotify tool installed on your system.How to do itCreate a script...

Write a bash script to configuring basic network connectivity

In this article, we are going to configure basic network connectivity using wpa_supplicant.PrerequisitesBesides having a terminal open, we need to remember a few concepts: Check whether wpa_supplicant is installed or not. You should know the SSID and password....

Gathering network information for Linux Operating System

In this article, we are going to test IPv4's connectivity and write scripts for it.PrerequisitesBesides having a terminal open, we need to remember a few concepts: The If..Else condition case in shell scripting IP address of the device curl command must be installed...

Gathering and aggregating system information in Linux

In this article, we are going to discuss the dmidecode Linux tool, which will gather information about the system such as CPU information, server, memory, and networking.PrerequisitesBesides having a terminal open, we need to remember a few concepts: We are going to...

Ubuntu basic security practices

In this article, we will look at some best practices to secure Ubuntu systems. Linux is considered to be a well secured operating system. It is quite easy to maintain the security and protect our systems from unauthorized access by following a few simple norms or...

Configure Ubuntu system to connect network with static IP

When you install Ubuntu server, its network setting defaults to dynamic IP addressing, that is, the network management daemon in Ubuntu searches for a DHCP server on the connected network and configures the network with the IP address assigned by DHCP. Even when you...

Securing Ubuntu System against brute force attacks

So you have installed minimal setup of Ubuntu, you have setup SSH with public key authentication and disabled password authentication, and you have also allowed only single non-root user to access the server. You also configured a firewall, spending an entire night...

Securing a network with uncomplicated firewall in Ubuntu System

It is said that the best way to improve server security is to reduce the attack surface. Network communication in any system happens with the help of logical network ports, be it TCP ports or UDP ports. One part of the attack surface is the number of open ports that...

Install and configure OpenVPN for securing remote access in Ubuntu

VPN enables two or more systems to communicate privately and securely over the public network or Internet. The network traffic is routed through the Internet, but is encrypted. You can use VPN to set up a secure connection between two datacenters or to access office...

Tuning the TCP stack in Ubuntu Operating System

Transmission Control Protocol and Internet Protocol (TCP/IP) is a standard set of protocols used by every network-enabled device. TCP/IP defines the standards to communicate over a network. TCP/IP is a set of protocols and is divided in two parts: TCP and IP. IP...

Install and configure HAProxy for load balancing on Ubuntu

When an application becomes popular, it sends an increased number of requests to the application server. A single application server may not be able to handle the entire load alone. We can always scale up the underlying hardware, that is, add more memory and more...

Install and configure NTP on Ubuntu

Network Time Protocol (NTP) is a TCP/IP protocol for synchronizing time over a network. Although Ubuntu has a built-in clock that is helpful for keeping track of local events, it may create issues when the server is connected over a network and provides time-critical...

Install and configure squid proxy server on Ubuntu

In this article, we will install and configure the squid proxy and caching server. The term proxy is generally combined with two different terms: one is forward proxy and the other is reverse proxy. When we say proxy, it generally refers to forward proxy. A forward...

Installing the DNS server on Ubuntu

DNS, also known as name server, is a service on the Internet that provides mapping between IP addresses and domain names and vice versa. DNS maintains a database of names and related IP addresses. When an application queries with a domain name, DNS responds with a...

Installing the DHCP server on Ubuntu

DHCP is a service used to automatically assign network configuration to client systems. DHCP can be used as a handy tool when you have a large pool of systems that needs to be configured for network settings. Plus, when you need to change the network configuration,...

How to secure user accounts in Ubuntu

In this script, we will look at ways to make user profiles more secure.Follow these steps to secure the user account:Set a strong password policy with the following steps: Open the /etc/pam.d/common-password file with GNU nano:...

A Message From Our Editor

Dear Readers:

We are presenting you with a new journal called LinuxConcept. Our goal is to create a new forum for exchange of information on all aspects of Linux and Opensource technology. Future scope of the LinuxConcept is open to your suggestions. I would like to encourage you to submit original research articles as well as opinions, technical reports, and short communications in the Linux and Open source. The success of this portal depends on your response. I would appreciate your feedback.

Satish Kumar

Satish Kumar

Editor in Chief

Join Our Nesletter