Linux Server See the Historical and Statistical Uptime of System With tuptime Utility

Posted on in Categories Command Line Hacks, Hardware last updated July 15, 2017

You can use the following tools to see how long system has been running on a Linux or Unix-like system:

  • uptime : Tell how long the server has been running.
  • lastt : Show the reboot and shutdown time.
  • tuptime : Report the historical and statistical running time of system, keeping it between restarts. Like uptime command but with more interesting output.

Collecting Ubuntu Linux System Information

Posted on in Categories Command Line Hacks, Hardware, Howto last updated September 2, 2015

For new computer or Laptop or server, I need to collect the information about its hardware. This is also useful when you need to replace a disk or memory with a vendor. In order to replace hardware you need all information in advance. In this post, I’m going to list commands that you can use to collect the hardware information.
Ubuntu Linux Server Collecting System Information

Learning bash scripting for beginners

Posted on in Categories Command Line Hacks, Howto, Open Source last updated January 6, 2017

Bash (Bourne-Again SHell) is a Linux and Unix-like system shell or command language interpreter. It is a default shell on many operating systems including Linux and Apple MacOS X. Shell scripts are a fundamental part of the Unix programming environment.

If you have always used a graphic user interface like KDE or Gnome or MS-Windows or Apple OS X, you are likely to find bash shell confusing. If you spend some time with the bash shell prompt and it will be difficult for you to go back.

Learn bash

Here are a list of tutorials and helpful resources to help you learn bash scripting and bash shell itself. You should read the following documents if you are interested in learning the basics of shell scripting.

A Shell Primer: Master Your Linux, OS X, Unix Shell Environment

Posted on in Categories Command Line Hacks, Howto last updated November 9, 2016

On a Linux or Unix-like systems each user and process runs in a specific environment. An environment includes variables, settings, aliases, functions and more. Following is a very brief introduction to some useful shell environment commands, including examples of how to use each command and setup your own environment to increase productivity in the command prompt.

7 Awesome Open Source Cloud Storage Software For Your Privacy and Security

Posted on in Categories Cloud Computing, Datacenter, Hardware, Open Source, Storage last updated May 7, 2017

Cloud storage is nothing but an enterprise-level cloud data storage model to store the digital data in logical pools, across the multiple servers. You can use a hosting company such as Amazon, Google, Rackspace, Dropbox and others for keeping your data available and accessible 24×7. You can access data stored on cloud storage via API or desktop/mobile apps or web based systems.

In this post, I’m going to list amazingly awesome open source cloud storage engines that you can use to access and sync your data privately for security and privacy reasons.

5 Awesome Open Source Backup Software For Linux and Unix-like Systems

Posted on in Categories Open Source last updated May 7, 2017

A good backup plan is essential in order to have the ability to recover from

  • Human errors
  • RAID or disk failure
  • File system corruption
  • Data center destruction and more.

In this post I’m going to list amazingly awesome open source Backup software for you.

What to look for when choosing backup software for an enterprise?

Make sure the following features are supported backup software you deploy:

Secure Your Linux Desktop and SSH Login Using Two Factor Google Authenticator

Posted on in Categories Open Source, Security last updated October 29, 2014

Two factor authentication is increasingly becoming a strongly recommended way of protecting user accounts in web applications from attackers by requiring a second method of authentication in addition to the standard username and password pair.

Although two factor authentication can encompass a wide range of techniques like biometrics or smart cards, the most commonly deployed technique in web applications is the one time password. If you have used applications like Gmail, you are probably familiar with the one time password generated by the Google Authenticator app that’s available on iOS or Android devices.

The algorithm used for the one time password in the Google Authenticator app is known as the Time-based One-Time Password (TOTP) algorithm. The TOTP algorithm is a standard algorithm approved by the IETF in (RFC 6238) totp-rfc.

5 Awesome Open Source Cloning Software

Posted on in Categories Datacenter, Hardware, Open Source, Storage last updated May 7, 2017

Cloning is nothing but the copying of the contents of a server hard disk to a storage medium (another disk) or to an image file. Disk cloning is quite useful in modern data centers for:

  1. Full system backup.
  2. System recovery.
  3. Reboot and restore.
  4. Hard drive upgrade.
  5. Converting a physical server to virtual machine and more.

In this post, I’m going to list the Free and Open Source Software for Disk Imaging and Cloning that you can use for GNU/Linux, *BSD and Mac OS X desktop operating systems.