Category: Linux 201

Linux tutorials focused on people with average knowledge of Linux, are also useful for those who frequently forget one or more commands .

Configure NTP on CentOS

Configure NTP on CentOS

NTP (Network Time Protocol) is a networking protocol for clock synchronization between computer using a  another reference time source. Installation NTP contains all the utilities that will synchronize the clock of all your computer,...

11 Tar Command Examples

11 Tar Command Examples

Tar is an archiving program created to store, maintain, modify and extract files from an archive file known as a tarfile. A tarfile may be made on a tape drive, however, it is also common to write a tarfile to...

SSH Key On Linux

SSH Key On Linux

SSH key identify trusted computers, without the need of passwords. One immediate advantage this method has over traditional password authentication is that you can be authenticated without having to send your password over the network offering additional...

Understanding Linux CPU Load

Understanding Linux CPU Load

Are you having problems understanding Linux CPU Load? You don’t know when is good or bad… or what those three numbers mean? Understanding Linux CPU Load If you are a sysadmin one of the...

Best Practices For Linux OpenSSH Server

Best Practices For Linux OpenSSH Server

What is OpenSSH? OpenSSH is a suite of security-related network-level utilities based on the SSH protocol, which help to secure network communications via the encryption of network traffic over multiple authentication methods and by...

Using Grep To Search For Text Patterns

Using Grep To Search For Text Patterns

I have been using Linux for a while on my server and have a large collection of the text file everywhere. I’m interested in learning about searching a text string. Can you tell me...

Nmap Examples For Network Admins

Nmap Examples For Network Admins

Nmap (Network Mapper) is a security scanner used to discover hosts and services on a computer network, thus creating a “map” of the network. To accomplish its goal, Nmap sends specially crafted packets to...

Check and Repair Corrupted File System On Linux

Check and Repair Corrupted File System On Linux

fsck utility is used to check and repair Linux filesystems (ext2, ext3, ext4, etc.). Depending on when was the last time a file system was checked, the system runs the fsck during boot time...