Author: Vikas Munjal

find files linux 520x245 - How to find the list of newly created files and directories in Linux file system? 0

How to find the list of newly created files and directories in Linux file system?

Linux is growing by leaps and bounds over the past decade and most of the organizations are intensely switching their production server environment to it nowadays. Today, We are showing an amazing trick to find the list of all newly created files and directories for the last day in your Linux file system, using “find” command. The sole purpose of this tutorial is to find the record of newly created files and directories on your Linux machine. There are several benefits of...

penguin banner3 520x245 - Powerful chattr command usage in Linux 0

Powerful chattr command usage in Linux

chattr (change attributes), is a powerful command line utility which is used to change the file attributes on a Linux file system. There is a number of benefits which can be obtained fruitfully by adding these advanced attributes to certain file/directories in a Linux file system. Accidentally, Users and Administrators may overwrite, modify or remove some important files on the Linux file system and put themselves in big trouble. Using...

Surveillance Linux Machine 5

How can I check who is logged on my Linux system?

Linux is an extraordinary operating system, which lets the user record every single process running on it. Today, we are going to show some thrilling commands, using which you can track “who is logged on my Linux system”. This tutorial will be very useful for administrators and novice users to Linux. who is logged on my Linux system. 1. command “w” w displays information about the users currently on the...

hsts 520x245 - How to Setup HTTP Strict Transport Security (HSTS) for Apache 0

How to Setup HTTP Strict Transport Security (HSTS) for Apache

HTTP Strict Transport Security, widely known as HSTS, is a web security policy mechanism in which website tells the browser that it should only be communicated using HTTPS, instead of using HTTP Protocol. This is achieved using an HSTS response header sent at the very beginning to the browser. The question which arises here is, why we want our website to communicate only over HTTPS Protocol??? HTTP stands for HyperText Transport Protocol, Which is just...

Two Factor Authentication 2

How to setup 2-Factor Authentication for GUI & SSH login | Google Authenticator

“Thought of security is a symptom of hidden insecurity in your mind”. We live in a world where data is one of the most important assets and risk of data loss always keep on swinging on our head like a pendulum. Therefore, We should seek and make every possible attempt to secure and authenticate our data. To avoid this threat administrators prefer to keep hard and complex passwords for login to...

MongoDB Administration 1

MongoDB Administration

Introduction Nowadays, Usage of MongoDB has grown up rapidly, but the main question is ??? How efficiently are you running MongoDB on your environment ??? Planning your environment and setting things up for success is great. In most of the cases, Administration and Monitoring of Mongo is “Taken with a grain of salt”. Monitoring Tools & Technique Log File – mongod.log The basic tool for monitoring activities in mongo is using its log file....