Generate SSH Public and Private Keys on Linux

SSH allows for both password based authentication, as well as public key authentication. Public key authentication is generally regarded as being more secure, as it isn’t as prone to brute force login attempts (if you disable password based authentication). The private key can also have a passphrase associated with it, which makes public key authentication […]

Share:
Continue Reading

Advanced Linux Grep Commands

Have you ever been into a situation where you need to search for a string, word or pattern inside a file? if yes, then the grep utility comes handy in such situation. grep is a command line utility for searching plain-text data for lines which matching a regular expression. If you will divide the word grep like g/re/p then the meaning of grep is (globally search a regular expression and print) which […]

Share:
Continue Reading

4 Useful Tools to Run Commands on Multiple Linux Servers

In this article, we will show how to run commands on multiple Linux servers at the same time. We will explain how to use some of the widely known tools designed to execute repetitive series of commands on multiple servers simultaneously. This guide is useful for system administrators who usually have to check the health […]

Share:
Continue Reading

30 YUM Command Examples for Linux

Yellowdog Updater, Modified (yum) is an open source package-management utility in Redhat based operating system. Yum takes care of automatic installation of dependent packages during package installation, removal, and updates. Yum uses Redhat Package Manager (RPM) and can install software packages from yum repositories (collections of RPM packages), which can be accessed locally or over a network […]

Share:
Continue Reading