Monthly Archive: March, 2013

yum repolist

GEEKS !! You have used the yum command for installing and managing packages under your Red Hat Linux Training. Sometimes you might want to see the information about various yum repositories that you… Continue reading

Remove Users email in Linux

GEEKS !! Remember you have configured mail servers during your Red Hat Linux Training. Here comes the easiest (perhaps) way to remove all the emails for a user in Linux. Simply give this… Continue reading

Samba Ports

GEEKS !! Hope you still remember samba configuration that you had done during your Red Hat Training or RHCE Training. If you have samba configured and also have a active firewall, in that… Continue reading

Changing Max Open File Linux

GEEKS !! Make sure you understand this simple logic about controlling max. number of open files under Linux. If you still remember your RHCE Training, then you should be remembering sysctl.conf file. There… Continue reading

tcp wrapper

GEEKS !! Remember the tcp-wrappers you had configured in your RHCE Training or RHCSS Training. Do you know, while using TCP-Wrappers to control a service. You can tell the config files (/etc/hosts.allow or… Continue reading

Network Traffic Monitoring using Tcpdump

Video by Network NUTS. Shows how you can use the tcpdump to monitor the network traffic hitting your Linux server. This can be very useful to monitor unusual network activity or checking why… Continue reading

Yum Search Linux

GEEKS !! Though you have used the yum command in your RHCE Training or any other Red Hat Linux Training. But, sometimes it can happen that you forget the exact name of the… Continue reading

Ping Record Route

GEEKS !! You have used the ping command for nearly all the purpose related to network issues. Remembering your Red Hat Linux training will make you forget the number of counts also. But… Continue reading

Checking Active Connections

GEEKS !! You are managing your Linux server using the skills you have learned in RHCE or RHCSS training and now want to check who over the network is accessing your Linux server… Continue reading