Basic Linux

Remove IP from Brute Force Protection

How to remove Ip from the Brute Force Protection by using SSH  ? When WHM locks out an user account, especially…

10 years ago

SSH with private key authentication

How to Add ssh user on linux server ? Ans: You can use the putyykey generator and generate the ssh…

10 years ago

Create yum repository on local machine

Yum repository on local machine If you want to install software/packages after installation of linux  (CentOS, Fedora etc.). You can create…

10 years ago

Using wget to download FTP folders

Using wget to download FTP folders If you want to copy all of the files and folders from one host…

10 years ago

Https to http redirection

How to redirect domain from https://domain.com to http://domain.com ? Ans:  If you tried all the possibilities with the .htaccess file…

10 years ago

Make your shell colorful

You can easily changed your black ssh screen to colorful screen by using following steps. 1) Login to the server…

10 years ago

AWK Linux command

why awk? awk is small, fast, and simple, unlike, say, perl. awk also has a clean comprehensible C-like input language,…

10 years ago

Server Monitoring Scripts and commands

Script to delete a line from a file if it have a particular pattern sed -i "/"pattern"/d" filename find /home/…

10 years ago

Script to automatically start mysql

The following script is used to  start mysql automatically when it is failed or stopped on the server. You can set 2…

10 years ago

How to run bash scripts from local machine to remote linux machine

Q. How to run bash script from local machine to remote linux machine ? Ans : We can run the…

10 years ago