ssh keys cover image

How to Set up SSH Keys on a Linux/Unix Server

SSH (Secure SHell) is a network protocol that allows you to securely execute commands on and transfer files to a remote server. Typically, most servers running SSH are configured to use password-based authentication; however,...

curl cover picture

cURL Command Tutorial with Examples

cURL is a command line tool and a library which can be used to receive and send data between a client and a server or any two machines connected over the internet. It supports...

wget cover image

How to Download Files and Web Pages with Wget

The wget command allows you to download files over the HTTP, HTTPS and FTP protocols. It is a powerful tool that allows you to download files in the background, crawl websites, and resume interrupted...

linux kill cover image

How to Kill a Process in Linux

In an operating system, there are many programs, which may be either run by an user or by the OS itself (such as system services). Such programs which are running on the system are...

A Guide to the Linux “Find” Command

The find command allows users to search for files and take actions on them. It is part of the “findutils” package and comes bundled with all distributions.  It is highly flexible, allowing you to...

An Introduction to Linux File Permissions

Linux is a multi-user operating system, and it ensures the security of files with the concepts of “ownership” and “permissions”. You can use these concepts to control who can access and modify files. In...

A Guide to Monitoring Servers with Nagios

Monitoring is an essential part of managing infrastructure. It helps you to ensure that your business keeps running smoothly, by alerting you to problems as they occur. Nagios is a very popular open-source application...

raid cover image

RAID levels 0, 1, 4, 5, 6, 10 explained

As businesses grow, demand arises for more reliable infrastructure that can handle critical systems. An important component in stable and scalable infrastructure is proper memory management. In this article, we will look at RAID...

Prometheus cover image

How to Install and Use Prometheus for Monitoring

  Monitoring is an important part of managing applications deployed on servers. They help you ensure applications run smoothly, as well as troubleshoot any problems that may arise. In this article, we will look...

vnstat cover

How to Monitor Network Traffic on Linux Using vnStat

Developers and sysadmins may need to monitor various network parameters, such as bandwidth consumption and the traffic flowing in/out. There are many tools available for this purpose, one of them being vnStat. It is...

How to Set up Basic HTTP Authentication on nginx

Files placed on a web server are publicly accessible by default. If you want to protect files from unauthorized access, you can make use of HTTP basic authentication. It is a simple authentication method,...

docker cover photo

Getting Started with Docker – Part 2

Docker has changed the way developers run, organize and deploy their code and infrastructure. In the docker series articles, we will be understanding how Docker works, installation and running code, deployment, container management and more....

A Guide to the Linux “Top” Command

The top command allows users to monitor processes and system resource usage on Linux. It is one of the most useful tools in a sysadmin’s toolbox, and it comes pre-installed on every distribution. Unlike...

How to Configure nginx as a Load Balancer

For very small websites, a single server running a web application is usually enough. However, this doesn’t work well for larger websites. In such cases, we make use of “load balancing”, a technique that...

How to Install Grav CMS on Debian/Ubuntu

The Content Management System (CMS) market today is captured by the three giants — WordPress, Drupal, and Joomla with WordPress being the leader. Grav CMS is a new kid on the block featuring an...

Managing Your Linux Server with Webmin

Managing Linux servers can be very difficult at times. It can be very hard for someone who doesn’t have a lot of experience with the command-line tools. In addition, it’s also difficult for administrators...