MySQL has its own command line interpreter (CLI). You need to know how to access it to do very basic administration. You can access the MySQL CLI using the mysql command followed by the -u option for the username and -p, which tells MySQL to prompt for a password. Here user root gains access: [root@bigboy [...]
OpenVZ is an operating system-level virtualization technology based on the Linux kernel and operating system. OpenVZ allows a physical server to run multiple isolated operating system instances, known as containers, Virtual Private Servers (VPSs), or Virtual Environments (VEs). It’s similar to FreeBSD Jails and Solaris Zones. vzdump is a backup and restore utility for OpenVZ [...]
Command Summary Use arp Command mostly used for checking existing Ethernet connectivity and IP address Most common use: arp This command should be used in conjunction with the ifconfig and route commands. It is mostly useful for me to check a network card and get the IP address quick. Obviously there are many more parameters, [...]
Many users, despite having a good Net connection, complain about poor surfing and download speeds. While an organization could pay for additional bandwidth, a better option might be to manage the bandwidth they already have. There are numerous bandwidth management software tools available. In this article we will explore managing network bandwidth using the dummynet [...]
All of the operations considered in this article are operations upon a router, whether that router is a Linux box or Cisco dedicated hardware or some other type of machine. In this chapter I consider the traditional methods of IPv4 routing as using static configurations that are manually input by the network administrator. 1.1 Traditional [...]
In RegEdit, navigate to the branch or sub-branch that contains your functionality. It doesn’t matter how deeply buried the key(s) are that contain your features; just that you select only your own changes. It might be necessary to analyze the registry before and after you make your changes to figure out which Registry keys are [...]
This is an introductory guide for people learning to use a Linux system. It focuses on command-line usage. This is not because everyone will be doing everything at the command line. On the contrary, there are many useful GUI tools and programs in Linux, and some people will be content to stay with these. However, in contrast to GUI programs, which can be learned largely by “click and try”, the command-line requires some deliberate learning, and reading documentation. The benefit of this investment is that you will learn the tools and tricks of the command line which are in many cases faster, more powerful, and more flexible than any GUI program.
Websense Express protects against potential data storage issues and performance degradation by limiting the size of the Log Database. This database contains partitions that roll over every day. When a partition is 30 days old, it is deleted automatically.If your organization requires that data older than 30 days be preserved, you can export reports to [...]
Just imagine your yahoo account hacked from under your nose. All your personal mails, confidential files, pictures, membership access, and contacts being accessed by a disguised criminal. To your utter surprise it may happen that your zip code has been changed and deleted. Even your alternate email has been changed so there are no chances to reset your password. You are at complete loss.
The process for managing local users and groups is straight forward and differs very little from most other GNU/Linux operating systems. Ubuntu and other Debian based distributions, encourage the use of the “adduser” package for account management. To add a user account, use the following syntax, and follow the prompts to give the account a [...]
Ubuntu developers made a conscientious decision to disable the administrative root account by default in all Ubuntu installations. This does not mean that the root account has been deleted or that it may not be accessed. It merely has been given a password which matches no possible encrypted value, therefore may not log in directly [...]
Subversion manages branches a bit differently than CVS; there’s a good document (SVN for CVS users) at the Subversion site. You should read that. The long short of it is that you have to restructure your directories a little bit before using Subversion. Caveat: this restructuring isn’t neccessary, and the following tree hierarchy isn’t neccessarily [...]
Caching seems to be the new trend. But aside from all the marketing, itâ€™s really a lot more than that. If you donâ€™t have the money to buy those lovely Zend products, you might find yourself turning to the world of Open Source (again). And viola! Youâ€™ll be helped. There are two ways to cache [...]
Establish policies for acceptable use of instant messaging and ensure that all users are aware of those policies and clearly understand the potential risks. Establish policies for Mobile device usage, including password and encryption requirements. Create proper configuration standards for IM products that restrict file transfers. In general, users should not be permitted to install [...]
User accounting can be used to discover information about who is currently using the system. While you cannot necessarily verify the integrity of this information once your machine has been exploited, it can be a useful tool to track the systems a particular user has logged into, what time he or she logged in, when [...]