Install XRDP on Ubuntu Server with XFCE Template

By | 2017-02-27T18:43:19+00:00 February 27th, 2017|

In this tutorial we can check how to install XRDP on Ubuntu Server with XFCE Template First of all, RDP stands for Remote Desktop Protocol which is developed by Microsoft, through which a user can connect to another computer over a network connection with a graphical interface. The user needs to install an RDP client software [...]

Managing temporary files with systemd-tmpfiles

By | 2017-01-28T11:35:30+00:00 January 28th, 2017|

In this tutorial we can check how to manage temporary files with systemd-tmpfiles   A modern system requires a large number of temporary files and directories. Not just the highly user-visible ones such as /tmp that get used and abused by regular users, but also more task-specific ones such as daemon and user-specific volatile directories under [...]

Simple steps to install KVM in Linux

By | 2017-01-28T11:34:50+00:00 January 28th, 2017|

In this tutorial we can learn how to install KVM in Linux KVM stands for kernel based virtual machine. KVM is an open source hardware virtualization software, so we can install KVM free of charge. We can create and run multiple Linux and Windows based operating systems on KVM. The KVM module loaded into the [...]

Install Squid to Configure Proxy Server

By | 2017-01-28T11:34:47+00:00 January 28th, 2017|

In this tutorial we can check steps to install squid to configure a Proxy Server Squid is a caching web proxy server, which is generally installed on a separate server than the webserver with the original files. Squid initially acts as a intermediary, and it passes user request to the server and saving a copy [...]

Important Postfix Configuration Settings

By | 2018-06-12T07:24:08+00:00 January 5th, 2017|

In today’s corporate environment, email is a common method of communication. End users may use dedicated mail clients such as Evolution and mutt to read and send email, or the organization may have a web-based interface for its mail service. However, Linux servers also send email, usually for automatic purposes or to report errors to [...]

How To Extract .tar.gz Files using Linux Command Line

By | 2017-01-05T16:53:13+00:00 January 5th, 2017|

In this tutorial we can learn how to extract tar.gz files using Linux Command line tools. A .tar.gz file is nothing, but an archive. It is a file that acts as a container for other files. The tar program provides the ability to create tar archives, as well as various other kinds of manipulation. For [...]

IP Masquerading in Linux

By | 2018-06-12T07:30:42+00:00 January 5th, 2017|

IP Masquerade is a networking function in Linux similar to the one-to-many NAT (Network Address Translation) servers found in many commercial firewalls and network routers. IP Masquerade, also called IPMASQ or MASQ, allows one or more computers in a network without assigned IP addresses to communicate with the Internet using Linux server's assigned IP address. [...]

All about Linux Process Scheduling And Multitasking

By | 2018-08-16T01:47:11+00:00 January 5th, 2017|

Modern computer systems range from low-end processors that can only execute one single instruction at a time to high-performing supercomputers with hundreds of CPUs each and multiple cores on each CPU, performing hundreds of instructions in parallel.  All of these systems tend to have one thing in common: They always need to run more processes [...]

Task Scheduling In Linux Command Line

By | 2018-08-28T18:10:46+00:00 January 5th, 2017|

In this tutorial we can learn how to schedule tasks via the Linux Command line Scheduling one-time tasks with at One solution available to users of a Linux system for scheduling future tasks is at. This not a standalone tool, but rather a system daemon (atd), with a set of command-line tools to interact with [...]

Linux Network Address Translation (NAT)

By | 2017-01-05T16:25:59+00:00 January 5th, 2017|

Firewalld supports two types of Network Address translation(NAT): masquerading and port forwarding. Both can be configured on a basic level with regular firewall-cmd rules, and more advanced forwarding configurations can be accomplished with rich rules. Both forms of NAT modify certain aspects of a packet, like the source or destination, before sending it on.   [...]

Load More Posts