recently added NAT rules on my RHEL 6.x system. How do I see the rules including line numbers that I just added in Linux? [click to continue…]
ow do I identify the boot device or boot path in Linux operating system? [click to continue…]
s it possible to just backup my Linux partition table and restore it when required? How do I restore partition table if it get deleted by mistake on Linux operating system? How do I backup and restore a GPT partition table on Linux? [click to continue…]
s there a CPU-Z like a freeware/open source software that detects the central processing unit (CPU) of a modern personal computer in Linux operating system? How can I get detailed information about the CPU(s) gathered from the CPUID instruction, including the exact model of CPU(s) on Linux operating system? [click to continue…]
he Intel Advanced Encryption Standard (AES) or New Instructions (AES-NI) engine enables extremely fast hardware encryption and decryption for openssl, ssh, vpn, Linux/Unix/OSX full disk encryption and more. How do I check support for Intel or AMD AES-NI is loaded in my running Linux in my Linux based system including openssl? [click to continue…]
would like to know how to change a UID (USER ID)/GID (GROUP ID) and all belonging files on Linux operating system. Say, I want to change UID from 1005 to 2005 and GID from 1005 to 2005 on Linux. How do I make such change for belonging files and directories? [click to continue…]
hat is a “locale” on a Linux operating system? How do I set or get locals (i18n) values on a Linux operating system? [click to continue…]
have a backup sync program on local server. I have an ssh password less login set up, and I can run commands on an external server in bash script doing:
ssh root@server2 "sync; sync; /sbin/shutdown -h now"
How do I run multiple commands in bash on a remote Unix or Linux server? What is the best way to SSH in and run various unix commands in a bash shell?
[click to continue…]
very serious security problem has been found in the virtual floppy drive QEMU’s code used by many computer virtualization platforms including Xen, KVM, VirtualBox, and the native QEMU client. It is called VENOM vulnerability. How can I fix VENOM vulnerability and protect my Linux server against the attack? How do I verify that my server has been fixed against the VENOM vulnerability? [click to continue…]
ow can I modify partition labels on a Linux operating systems? How to change disk name on the ext4 file system on a Ubuntu Linux using command line? [click to continue…]