≡ Menu


How to Change a USER and GROUP ID on Linux For All Owned Files

I would like to know how to change a UID (USER ID)/GID (GROUP ID) and all belonging files on Linux operating system. Say, I want to change UID from 1005 to 2005 and GID from 1005 to 2005 on Linux. How do I make such change for belonging files and directories?
[click to continue…]

How to Set Locales (i18n) On a Linux or Unix

What is a "locale" on a Linux operating system? How do I set or get locals (i18n) values on a Linux operating system?
[click to continue…]

How To SSH Run Multiple Command On Remote Machine And Exit Safely

I have a backup sync program on local server. I have an ssh password less login set up, and I can run commands on an external server in bash script doing:

ssh root@server2 "sync; sync; /sbin/shutdown -h now"

How do I run multiple commands in bash on a remote Unix or Linux server? What is the best Way to SSH in and Run various unix commands in bash?
[click to continue…]

A very serious security problem has been found in the virtual floppy drive QEMU's code used by many computer virtualization platforms including Xen, KVM, VirtualBox, and the native QEMU client. It is called VENOM vulnerability. How can I fix VENOM vulnerability and protect my Linux server against the attack? How do I verify that my server has been fixed against the VENOM vulnerability?
[click to continue…]

Linux Change Disk Label Name on EXT2 / EXT3 / EXT4 File Systems

How can I modify partition labels on a Linux operating systems? How to change disk name on the ext4 file system on a Ubuntu Linux using command line?
[click to continue…]

Bash: Reissue And Repeat A Long Command Without Retyping It on a Linux, OS X & Unix

I'm a new Ubuntu Linux user. In Linux, Apple OS X or Unix-like systems, how do I reissue or repeat a long command without retying it?
[click to continue…]

Glibc: GHOST Vulnerability Test To See If a Linux Sever Is Secure

The GHOST (CVE-2015-0235) is serious network function vulnerability in Glibc. How do I check and test if a my Linux based server is secure using command line options?
[click to continue…]

Linux: Start / Stop / Restart Apparmor

AppArmor is a Linux Security Module (LSM) implementation of name-based mandatory access controls (MAC). How do I start / stop / restart AppArmor under Ubuntu Linux or OpenSuse / Suse Enterprise Linux server systems running on IBM hardware?
[click to continue…]


I'm setting up server on an Amazon EC2 compute instance powered by Suse Enterprise Linux server. I am using the following command to login into the my EC2 compute from OS X/Ubuntu desktop:

ssh -i suse-ec2-server-jp.pem root@ec2-xx-yy-zzz-yyy.compute-1.amazonaws.com

I am getting the following error:
Permissions 0440 for 'suse-ec2-server-jp.pem' are too open.
It is recommended that your private key files are NOT accessible by others.
This private key will be ignored.
bad permissions: ignore key: suse-ec2-server-jp.pem

How do I fix this problem and login using ssh command?
[click to continue…]

Linux: Update All Packages Command

How do I update all installed packages on Linux operating systems? How do I perform upgrading packages through a network on Linux operating systems?
[click to continue…]