Basic Linux

Remove IP from Brute Force Protection

How to remove Ip from the Brute Force Protection by using SSH  ? When WHM locks out an user account, especially…

9 years ago

SSH with private key authentication

How to Add ssh user on linux server ? Ans: You can use the putyykey generator and generate the ssh…

9 years ago

Create yum repository on local machine

Yum repository on local machine If you want to install software/packages after installation of linux  (CentOS, Fedora etc.). You can create…

9 years ago

Using wget to download FTP folders

Using wget to download FTP folders If you want to copy all of the files and folders from one host…

9 years ago

Https to http redirection

How to redirect domain from https://domain.com to http://domain.com ? Ans:  If you tried all the possibilities with the .htaccess file…

9 years ago

Make your shell colorful

You can easily changed your black ssh screen to colorful screen by using following steps. 1) Login to the server…

9 years ago

AWK Linux command

why awk? awk is small, fast, and simple, unlike, say, perl. awk also has a clean comprehensible C-like input language,…

9 years ago

Server Monitoring Scripts and commands

Script to delete a line from a file if it have a particular pattern sed -i "/"pattern"/d" filename find /home/…

9 years ago

Script to automatically start mysql

The following script is used to  start mysql automatically when it is failed or stopped on the server. You can set 2…

9 years ago

How to run bash scripts from local machine to remote linux machine

Q. How to run bash script from local machine to remote linux machine ? Ans : We can run the…

9 years ago