I primarily use desktop Linux on my home computers. I also have multiple Linux servers for hosting It’s FOSS and related websites and open source software like Nextcloud, Discourse, Ghost, Rocket Chat etc. I use Linode for quickly deploying Linux servers in cloud in minutes. But recently, I installed Ubuntu server on my Raspberry Pi.
In this tutorial, I will show you how to set up a static IP address on a CentOS 8 server. I will show you three different ways to set up a static IP address by using nmcli, nmtui and by editing the interface configuration file directly. For this guide, we will set up a static
How can I allow traffic from a specific IP address in my private network or allow traffic from a specific private network through firewalld, to a specific port or service on a Red Hat Enterprise Linux (RHEL) or CentOS server? In this short article, you will learn how to open a port for a specific
This guide takes a tour of some of the best command-line tools that are used for searching matching strings or patterns in text files. These tools are usually used alongside regular expressions – shortened as REGEX – which are unique strings for describing a search pattern. Without much further ado, let’s dive in. 1. Grep
Putty is an opensource terminal emulator that supports several network protocols like Telnet, SSH, Rlogin, SCP, and Raw Socket. The initial version of putty is dated back to January 8, 1999, and designed for Windows Operating system but now it is supporting other operating systems like macOS and Linux too. But I have never seen people
No matter whether you’re a system administrator or just a casual desktop user, you may have heard about one of the most popular terminal-based system monitoring tool “top“. To many, it’s the task manager on Linux. In case you didn’t know, the “Top” utility helps display all the running processes and gives you some important
As a Linux user, you can opt either to allow or restrict network access to some services or IP addresses using the firewalld firewall which is native to CentOS/RHEL 8 and most RHEL based distributions such as Fedora. The firewalld firewall uses the firewall-cmd command-line utility to configure firewall rules. Before we can perform any
When it comes to accessing remote devices such as servers, routers, and switches, SSH protocol comes highly recommended given its ability to encrypt traffic and ward off anyone who might try to eavesdrop on your connections. Be that as it may, the default settings of SSH are not infallible and additional tweaks are needed to
You are aware of “pwd” command, aren’t you? The pwd command (stands for Present Working Directory) is used to print the current working directory. What about “pwdx”? Have you ever used or heard of it? No? No problem! The pwdx command is to used report current working directory of a process. In this guide, we
Introduction When setting up cloud infrastructure, getting your applications up and running will often be your primary concern. However, making your applications function correctly without addressing the security needs of your infrastructure could have devastating consequences down the line, so it is worthwhile to consider this as part of your initial infrastructure setup. In this