
How to Check if Your Linux Server Is Under DDoS Attack
Whether you’re a blogger, the owner of an eCommerce shop, or a webmaster for a local service provider, everyone knows that in today’s internet-driven world, …
Whether you’re a blogger, the owner of an eCommerce shop, or a webmaster for a local service provider, everyone knows that in today’s internet-driven world, …
Login to your Ubuntu server with root user with your favorite SSH client Lets first update the operating system with all the latest packages with …
In this guide, we’ll cover how to change a password in Linux using the passwd command followed by the name of the desired user. This …
Please refer the following steps to rectify the above issue. Login into server as a root and edit the file called /etc/sysctl.conf vi /etc/sysctl.conf Add …
HotLinking is something using which you can display an image, which you have seen on someone else’s site, on your site. Bandwidth in this case …
Please refer the following steps: 1. Login to your server as root. 2. Open up /etc/init.d/httpd using your favorite editor vi /etc/init.d/httpd 3. add ulimit …
MySQL is an open-source relational database management system that is based on SQL queries. It is compatible with most known programming languages and can be …
In Linux, log files display a timeline of events for specific processes and parts of the system. For example, there are log files for dpkg, …
Viewing Text File Content The cat command allows you to read /view the contents of the text files without editing them. The easiest method of …
For setting up different time zone for a particular domain, you need to specify the time zone in the file called “php.ini”. If you have …
Please refer the following steps: a. Login to the server as root. b. Execute the following command: root@host [~]# visudo c. The screen …
This website uses cookies to ensure you get the best experience on our website. Please read our Privacy Policy.