[csargrnds@teknixx-01 ~]$ ./welcome_to_Teknixx.sh Blog

Amazon SES Postfix configuration

Amazon SES Postfix configuration

Amazon Simple Email Service also known Amazon SES evolved from the email platform that Amazon.com created to communicate with its own customers. Amazon SES eliminates the complexity and expense of building an in-house email solution....

Install-Odoo8-on-CentOS

Install Odoo 8 on CentOS

Install Odoo 8 on CentOS in less than 20 min. In this tutorial you will learn how. Odoo (Formerly OpenERP) is a comprehensive suite of business applications including Sales, CRM, Project management, Warehouse management, Manufacturing,...

Install-OTRS-on-CentOS

Install OTRS on CentOS

Install OTRS on CentOS in less than 20 min. In this tutorial you will learn how. OTRS is an Open source Ticket Request System. It provides a single platform of contact for users, customers, IT...

Configure NTP on CentOS

Configure NTP on CentOS

NTP (Network Time Protocol) is a networking protocol for clock synchronization between computer using a  another reference time source. Installation NTP contains all the utilities that will synchronize the clock of all your computer,...

Get MySQL Database Size from Terminal

Get MySQL Database Size from Terminal

Let’s suppose you wake up one day and you need to get MySQL database size from terminal, well keep calm and Just do the follow. List all the databases with their respective sizes SELECT table_schema...

Linux Security Tips

Linux Security Tips

Today i’m going to show you some Linux security tips, so you can sleep well tonight. Developing a security policy Create a generic policy that applies on all your system, and your users can readily...

11 Tar Command Examples

11 Tar Command Examples

Tar is an archiving program created to store, maintain, modify and extract files from an archive file known as a tarfile. A tarfile may be made on a tape drive, however, it is also common to write a tarfile to...

SSH Key On Linux

SSH Key On Linux

SSH key identify trusted computers, without the need of passwords. One immediate advantage this method has over traditional password authentication is that you can be authenticated without having to send your password over the network offering additional...