free tips on windows, linux. sql, mysql,apache,antivirus, virus, security, database, software, hardware

How To Extend MyISAM Table Size Limitation

By default, MySQL server only allows a 4GB limitation to MyISAM table size. This prevents further increase of MyISAM table size and thus generates a table full MySQL error. To surpass this limit, here’s a quick MySQL tweak to increase the default table size limitation. Increase MyISAM Table Size Limit Backup and edit /etc/my.cnf and(…)

How To Get Your Most and Top SSH Port Attacker From Terminal

SSH port is only one of the most typical ports being bombarded and attacked by unauthorized hosts trying to get access to your server via SSH port. Preventing these SSH port attacks from unauthorized hosts can be done in many several ways. By default SSH setup, SSH daemon service echoes its SSH activities to default(…)

How To Get SSH Users With Most Failed Login Attempts via Terminal

Bash-enabled linux SSH accounts are one of the sweetest and enticing server aroma for a SSH port attacket to get one from a server being managed by somebody else. Here’s a quick post on how to list down the SSH user accounts with most failed SSH login attempts. Get Most Attacked SSH System Accounts SSH(…)

How To Monitor Bandwidth Usage Per Application Process and Thread

Typically, a linux bandwidth monitoring software measures and graphs internet bandwidth consumptions. These bandwidth consumptions are then grouped and classified to different types of usage views. Usage views of bandwidth graphs are then presented on a wide variety of presentation types, depending on bandwidth monitoring features. These can be per hosts, IP address, subnet network,(…)

How To Identify The Passed Kernel Parameter After Rebooting

Kernel by default can accept kernel parameter to extend and modify its kernel parameter modules and kernel options. This can be done initially during the process of boot selection before bootup process. But, what if the server is currently running and you wish to determine the submitted kernel parameters from the last bootup sequence. Here’s(…)

How To Monitor Linux System Latency

Latency monitoring can also be done in linux specially in Fedora. Latency is a big part of monitoring ethics as the latency is always being checked, not only between two hosts but also from inside the server itself. Here’s a quick post on how to monitor system latency from your linux box. What is LatencyTop?(…)

How To Monitor and Measure HTTP Latency

The highest part of linux system administration tasks are making use of widely available linux and free open source software be fully part of sysad job accomplishment and functions, with the use of linux resources around. Here’s a quick entry on how to monitor and measure HTTP or website latency. Introducing HTTP_PING In a simple(…)

How To Do HTTP 301 Redirection using PHP and Perl

At times, a permanent HTTP 301 redirection is needed to redirect a website location to another. Permanent redirection via HTTP 301 is advised on website redirection where an old link or website needs to be redirected to another website domain or website location. In short, HTTP 301 code tells user-agents that the current location has(…)

How To Download MetaCafe/Google Video/YouTube Videos From Terminal

Recently, we have covered downloading of youtube videos from command line terminal here using youtube downloader called youtube-dl . Now, here’s an alternative that download’s video from many video websites like Google Video, Metacafe, Sevenload including YouTube and saved it as MP4 video file. Introducing Clive Video Downloader Clive is a linux video extraction terminal(…)

How To Show Expiration Date of Linux User Account

A basic thing to do on flat file linux user account authentication is to identify its account expiration date. Most conventional linux setup makes use of flat file system authentication. This type of authentication makes use of /etc/passwd, and /etc/shadow files mainly, including the user group file /etc/group . Here’s a real quick on how(…)

How To Find Your Current Host ID

A host ID is a unique identifier of your computer hosts. This host ID is particualrly used for unique host’s computer identification. The concept of using this unique host identifier enables most commercial software companies to ahve additional identification function to their commercial softwares. Commercial software can lock license based on  this unique host or(…)

How To Find Volume Name From Terminal

ISO-9660 file system usually carries a volume name identifier called volume name. One typical ISO-9660 file system is CD-ROM. CD-ROM normally carries this CD volume name embedded from the disk. These volume name can easily be retrieved in linux via terminal. Here’s a quick post on how to find the volume name of ISO-9660 file(…)