Check and Repair Corrupted File System On Linux
fsck utility is used to check and repair Linux filesystems (ext2, ext3, ext4, etc.). Depending on when was the last time a file system was checked, the system runs the fsck during boot time...
fsck utility is used to check and repair Linux filesystems (ext2, ext3, ext4, etc.). Depending on when was the last time a file system was checked, the system runs the fsck during boot time...
Deprecated Linux networking commands in question are: arp, ifconfig, iptunnel, iwconfig, nameif, netstat, and route. These programs (except iwconfig) are included in the net-tools package that has been unmaintained for years. The functionality provided...
Today i’m going to show you how to cover your tracks on a Linux Server and Leave no trace behind. First at all, where are the login information stored? The /var/log/lastlog file stores user last login...
1. Verify your backups are working. Before making any changes to your production system, be sure that your backups are working. You may even want to run some test recoveries if you are going...
Vulnerability The CVE-2015-0291 vulnerability introduces the possibility of a denial of service attack against a system running OpenSSL 1.0.2. If a malicious client connects to an OpenSSL server and the server requests a certificate...