Archive: Unix/Linux All

Centralize and Monitor Application and System Logs

No comments

Centralize and Monitor Application and System Logs It becomes a new challenge for organization to make sense of the millions of log lines. In addition, log management became more critical to monitor system and application performance and security risk. On the other hand, log management may be very time consuming with traditional methods. If you […]

Pulse Secure Client Installation on Linux

No comments

Pulse Secure Client Installation on Linux VPN (Virtual Private Network) is a service that lets you access the restricted area and privately by routing your connection through a VPN server. All VPN solutions provide clients with ability to connect to restricted areas with authentication methods. Pulse Secure is one of the enterprise VPN solution that […]

An Introduction to OpenSSL

1 comment

Imagine that you need to send a message to someone. However, you do not know where he is or what his contact detail is. You just know another man who has his contacts that can send your message to him. Internet was designed in a way like the one describe above. The data passes through […]

Do you need to install antivirus programs on Linux?

No comments

I added some key points  about how you can  manage  linux servers and  also decide  whether  install  malware  protection  programs  or not. You should follow some basic  and also  important  security  rules  for  keep  linux servers safe. Update Software with  trusted repositories Remove  Unnecessary  Applications and  services. Beware  about  security and manage  Linux User  Roles […]

RHEL 7 Iptables and Firewalld Problem for Virtulization Server

No comments

Firewalld  is a new  service on RHEL7 which you can use instead  of  iptables. Firewalld  has  a new  userland  interface and also has  a real time  firewall service that  you can  change  config without stopping current connections. There are so  many  benefits and new added  feature  that  we can talk about  but not at  this  […]

Linux Bonding Slave interface Replacement

No comments

The Linux bonding  driver provides  a method for aggregating multiple network devices  into a single logical interface which named  “bonded” interface. Behave  of bonding interface  depends  on bonding  mode  . Mode 1 (active-backup policy) Mode 2 (XOR policy) Mode 4 (IEEE 802.3ad policy) Mode 5 (adaptive transmit load balancing policy) You can get detail information about […]

How to use sar command?

No comments

About SAR This article describes how to use “sar” command  to analyse system performance in Unix and Linux especially Oracle Solaris.We’ll describe sar command and parameters with examples. By  default sar package comes from Oracle Solaris and HP-UX installation but for linux you have to install sysstat package. Which  performance statistics you can monitor  with […]

Overview Of Unix/Linux Signals

No comments

Each signal has a default action associated  it, which determines how the process behaves when it is delivered the signal. Some of the actions are − Terminate the process. Ignore the signal. Dump core. This creates a file called process core dump. Stop the process. Continue a stopped process   How to send a signal to a […]