Published on : July 22, 2015 by Sebastian Chacko
Passwords are very important in order to keep our accounts secure. But sometimes we may forget our password or may need to change the password. Here I will point out some common ways to reset WordPress admin password. We can reset WordPress admin password using different methods: Using phpMyAdmin From MySQL command prompt Through WordPress […]
Published on : July 15, 2015 by Vishnu K Raj
PREFACE Software RAID is when the interaction of multiple drives is organized completely by software. RAID Level 1 (mirroring) achieves increased security since even if one drive fails, all the data is still stored on the second drive. There were a couple of instances where I have to break this RAID configuration. The RAID replace disk have […]
Published on : October 22, 2014 by Vipin R.N
Scenario Our requirement is to create VPS from a Node (or Physical server). The Virtualization technology adopted in the Node is OpenVZ (Open Virtuozzo). OpenVZ OpenVZ is an Operating System level, container-based Virtualization for Linux. OpenVZ creates multiple secure, isolated Linux containers (otherwise known as VEs or VPSs) on a single physical server enabling better […]
Published on : October 21, 2014 by Vipin R.N
Umask is used to remove additional permissions of files which are copied to the server. If the file has 777 permission on the source and uploaded via sftp using -p or -P option, the permission will be preserved. It can be used in SFTP to change permissions of files. For SFTP change permissions after uploading the […]
Published on : October 20, 2014 by Sreejith K R
We are here discussing different commands which can be used in find spamming in an Exim mail server, 1. Hourly count of sent mail for a domain, by specifying the domain and date. DOMAIN : domain.com without www YYYY-MM-DD : Date like 2011-11-03 LOGIN : dovecot_login / courier_login Replace all instances of above terms with appropriate […]