HP-UX tutorial on a Linux website? why not… To take a break, I decided to post a tutorial here on Creating and Extending LV on HP-UX. It’s better for me to post it here so it will serve my guide once I get my hands...
My webhosting company have to do emergency migration to the new server with still no definite reasons and all my hyperlinks are all messed up. It seems my mysql DB was not properly migrated and web site traffic logs are not...
10th day of the 10th month in 10th year, Ubuntu released 10.10 , a perfect date to denotes geekiness at its best 1010101010 🙂 Kidding aside, here’s the excerpt Coming from the Meerkat department Some time ago a group...
As posted on LinuxMint Official website: The team is proud to announce the release of Linux Mint 9 “Isadora”. Linux Mint 9 “Isadora” New features at a glance: New Software Manager 30,000 packages Review...
Snort® is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Other definitions: – Barnyard is an output system for Snort. Snort creates a special binary output format called...
Relaying to Gmail via smtp.gmail.com can be accomplished by configuring your Postfix with SASL authentication and TLS encryption. The common errors you will encounter if sending from your postfix mail server failing to gmail.com...
The next big version of Ubuntu Linux OS has now arrived and if offers new exciting features for users like quicker boot speed on almost any machine, along with a social networking-oriented ” Me Menu”,Ubuntu Software...
I.Configure Master 1. edit /etc/mysql/my.cnf. We have to enable networking for MySQL, I.Configure Master 1. edit /etc/mysql/my.cnf. We have to enable networking for MySQL, #skip-networking 2. Add the following line to the...
If you have multiple virtual hosts in your server and you specified different log files for each, it is more organized and easy to locate, but the downside is Linux has so called file descriptors or the number of files that it...
INTRODUCTION Data backup is the process of making copies of data in order to protect and restore original files whenever data loss happens. Aside from automated routine data backup, this method does not protect against failure...