[root@teknixx-01 ~]# ./welcome_to_Teknixx.sh Blog

Configure NTP on CentOS

Configure NTP on CentOS

NTP (Network Time Protocol) is a networking protocol for clock synchronization between computer using a  another reference time source. Installation NTP contains all the utilities that will synchronize the clock of all your computer,...

Get MySQL Database Size from Terminal

Get MySQL Database Size from Terminal

Let’s suppose you wake up one day and you need to get MySQL database size from terminal, well keep calm and Just do the follow. List all the databases with their respective sizes SELECT table_schema...

Linux Security Tips

Linux Security Tips

Today i’m going to show you some Linux security tips, so you can sleep well tonight. Developing a security policy Create a generic policy that applies on all your system, and your users can readily...

11 Tar Command Examples

11 Tar Command Examples

Tar is an archiving program created to store, maintain, modify and extract files from an archive file known as a tarfile. A tarfile may be made on a tape drive, however, it is also common to write a tarfile to...

SSH Key On Linux

SSH Key On Linux

SSH key identify trusted computers, without the need of passwords. One immediate advantage this method has over traditional password authentication is that you can be authenticated without having to send your password over the network offering additional...

Linux Backup Tools

Linux Backup Tools

Linux backup tools, A good plan b (backup) is essential in order to have the ability to recover from human errors, RAID or disk failure or File system corruption. A dependable backup tool is not...

Understanding Linux CPU Load

Understanding Linux CPU Load

Are you having problems understanding Linux CPU Load? You don’t know when is good or bad… or what those three numbers mean? Understanding Linux CPU Load If you are a sysadmin one of the...

Bash Shellshock Vulnerability CVE-2014-6271

Bash Shellshock Vulnerability CVE-2014-6271

Shellshock Vulnerability On September 24, 2014, a GNU Bash vulnerability, referred to as Shellshock or the “Bash Bug”, was disclosed. In short, the vulnerability allows remote attackers to execute arbitrary code given certain conditions,...