Author Archive

20 Nov 2015

Understanding UMASK value in Linux

UMASK (User Mask) is the default permission given when another file or directory is created on a Linux machine. At the point when user create a file or directory under Linux or UNIX, It create with a
19 Nov 2015

How to Delete a User on Ubuntu System

Ubuntu is a Linux operating system based on the Debian distribution. As with all other operating systems, maintaining user accounts is a routine task for Ubuntu system administrators. The essential steps for removing a user in Ubuntu
18 Nov 2015

How To Add and Grant Sudo Privileges to Users on Ubuntu System

“root” super user is the ruler of the users in Linux/Unix. Having root access give full and unlimited access to the Linux box. I will demonstrate to permit root access to a user in a Linux system.
17 Nov 2015

Reset Your Ubuntu Password

Sometimes you forgot user password it’s probably one of the most common problems you face. Fortunately on the off chance that you are using Ubuntu they made it extraordinarily simple to reset your password. Reset Your Ubuntu
16 Nov 2015

How to install SBackup on Ubuntu

Sbackup is a basic GUI backup program designed for desktop use, with a full set of features. It allows you to backup selected files and directories, define the file size limit, use regular expressions to exclude files
5 Nov 2015

How to Install MongoDB on Ubuntu

MongoDB is a free and open-source NoSQL document database used commonly in modern web applications. MongoDB offers a high performance, high availability, and automatic scaling enterprise database. MongoDB is a NoSQL database, so you can’t use SQL
4 Nov 2015

Apache Error Client Denied By Server Configuration

When we get “client denied by server configuration” error first thing in our mind comes that how we fix the error? By default Apache will not allow end users to do anything on default DocumentRoot. To fix
3 Nov 2015

How to Clear Memory Cache on Linux Server

We notified in most of time, we are facing low memory on Centos because so much memory for disk cache. Cache is used to keep data to use by CentOS or RHEL. Cache is used to keep
2 Nov 2015

How To Set Password Policy on CentOS/RHEL 5/6/7

Password policy is a critical factor in PC security since user passwords are too often the main purpose behind computer system security break. The secret word approach expected to characterize the minimum length of a password, the
31 Oct 2015

Restore System Default Permissions using Single Command

I recently came across a system which had a few directories set to 777(recursively), the sysadmin expected to install an application and changed all the permission a mess, I didn’t know where to begin, I found one