Satish Kumar

Satish Kumar

936 Articles Published

Articles by Satish Kumar

Page 19 of 94

How to Download and Install RHEL 9 for Free?

Satish Kumar
Satish Kumar
Updated on 11-Jul-2023 5K+ Views

Introduction Red Hat Enterprise Linux (RHEL) is a popular distribution of the Linux operating system designed for enterprise use. It is widely used in data centers, cloud computing environments, and mission-critical applications due to its robustness, reliability, and scalability. RHEL 9, the latest version released in May 2021, includes several new features and enhancements that make it an attractive option for businesses seeking a secure and stable operating system. Some of the key features of RHEL 9 include improved container capabilities with Podman and Buildah, enhanced security with OpenSCAP integration, better performance with XFS file system improvements, simplified application ...

Read More

How to Downgrade RHELCentOS to Previous Minor Release?

Satish Kumar
Satish Kumar
Updated on 11-Jul-2023 373 Views

Introduction In the world of enterprise-level Linux operating systems, Red Hat Enterprise Linux (RHEL) and its derivative, CentOS, are two of the most widely used distributions. They offer a stable and robust platform that is trusted by many organizations worldwide. However, sometimes it may become necessary to downgrade to a previous minor release due to compatibility issues or other reasons. In this article, we will show you how to downgrade RHELCentOS to a previous minor release safely. Preparing for Downgrade Backing up data and configurations Before beginning the process of downgrading your RHEL/CentOS system, it is essential to ...

Read More

How to Do Security Auditing of Linux System Using Lynis Tool?

Satish Kumar
Satish Kumar
Updated on 11-Jul-2023 351 Views

Introduction In today's world, where cyber threats and attacks have become more sophisticated and frequent, it is imperative to secure computer systems against malicious activities. A security audit is a systematic evaluation of the security of a computer system or network, which involves identifying potential vulnerabilities and addressing them before they are exploited by attackers. In this article, we will discuss how to perform a security audit on a Linux system using the Lynis tool. Definition of Security Auditing Security auditing refers to the process of evaluating the security posture of a computer system or network by examining its configuration ...

Read More

How to Disconnect Inactive or Idle SSH Connections in Linux?

Satish Kumar
Satish Kumar
Updated on 11-Jul-2023 19K+ Views

Introduction Secure Shell or SSH is a protocol that enables secure communication between two systems. In Linux, SSH is widely used to remotely access and manage servers. The tool establishes a secure connection between the client and server, encrypting the information being transmitted so that it can’t be intercepted by unauthorized entities. In Linux, SSH connections are created when a user logs in to a remote machine via the command-line interface. The user can execute commands on the remote host as if they were physically present on that machine. This way, system administrators and network engineers can manage multiple machines ...

Read More

How to Disable Suspend and Hibernation Modes In Linux?

Satish Kumar
Satish Kumar
Updated on 11-Jul-2023 12K+ Views

Introduction Linux is a popular operating system used by millions of people around the world. It offers a wide range of features and tools that are highly customizable, making it an excellent choice for power users who want to optimize their system performance. One of the most commonly used features in Linux is suspend and hibernation modes. Suspend mode is a power-saving feature that allows you to put your computer into a low-power state without shutting it down completely. In this mode, your computer will continue to consume some power, but at a much lower rate than when it ...

Read More

How to Disable SSH Root Login in Linux?

Satish Kumar
Satish Kumar
Updated on 11-Jul-2023 1K+ Views

Introduction In Linux systems, SSH (Secure Shell) is a common protocol used to connect and manage remote servers. It allows users to securely access and control their servers from anywhere in the world. The use of SSH is critical for system administrators and developers as it enables them to perform various tasks such as editing configuration files, transferring files, and managing services remotely. However, allowing root login via SSH creates significant security risks that can lead to unauthorized access and malicious attacks on your system. By disabling this feature, you can significantly reduce the chances of your Linux server ...

Read More

How to Disable root Login Access to PhpMyAdmin?

Satish Kumar
Satish Kumar
Updated on 11-Jul-2023 2K+ Views

Introduction PhpMyAdmin is a popular open-source tool used to manage MySQL databases. It provides a web interface that allows users to interact with the database through their web browser. One of the default login options for PhpMyAdmin is root login access, which grants a user full administrative privileges over the entire database system. While root login access may be convenient for initial setup and configuration, it poses significant security risks. If an attacker gains access to your root credentials, they can cause irreparable damage to your database or steal sensitive information. Explanation of Root Login Access The root user account ...

Read More

How to Disable Package Updates Using YUMDNF in RHEL Linux?

Satish Kumar
Satish Kumar
Updated on 11-Jul-2023 2K+ Views

Introduction YUMDNF stands for Yellowdog Updater Modified - Dandified YUM, Next Generation. It is a package manager used in RHEL (Red Hat Enterprise Linux) and CentOS distributions to manage software packages installed on the system. Unlike the traditional YUM package manager, YUMDNF provides extensive improvements that enhance the overall functionality of this tool. Why disabling package updates may be necessary Disabling package updates may become necessary when you have an important application running on your system, and you don't want any changes to break it. In some cases, updates can cause compatibility issues with applications or dependencies that are critical ...

Read More

Sustainable development with 5GIOT

Satish Kumar
Satish Kumar
Updated on 10-Jul-2023 238 Views

Introduction The world is facing a critical challenge in the form of a rapidly changing climate and environmental degradation caused by human activity. Therefore, it is imperative that we take measures to mitigate the impact we have on our planet while still pursuing economic growth and social development. This is where sustainable development comes in. Sustainable development refers to the practice of meeting current needs without compromising the ability of future generations to meet their own needs. It involves balancing economic, social, and environmental considerations in a way that promotes responsible use of natural resources while ensuring ...

Read More

Supernetting in Network Layer

Satish Kumar
Satish Kumar
Updated on 10-Jul-2023 2K+ Views

Introduction The increasing demand for internet connectivity and the growth of networks have made it necessary to implement different strategies to optimize network performance. One of these strategies is supernetting, a method that allows network administrators to aggregate multiple IP addresses into a single address block. This article will delve into the concept of supernetting, its importance in the network layer, differences between subnetting and supernetting, and how to implement it. Supernetting is the process of aggregating multiple contiguous IP address blocks into a single larger block. It is also known as route summarization, address aggregation or prefix aggregation. ...

Read More
Showing 181–190 of 936 articles
« Prev 1 17 18 19 20 21 94 Next »
Advertisements