Here is how to set up a cronjob that automatically backs up a MySQL database to a file every hour. Okay, so first we need to create a new script that will be executed via cron: #!/bin/bash YEAR=`date +%Y` MONTH=`date +%m` DAY=`date +%d` HOUR=`date...
Here is a small script that will send you an email when the disk usage rises above the percentage specified by the THRESHOLD variable (90% in the example bellow). If you don’t want to step up to a full monitoring solution such as Nagios...
Here is how to restrict users to send emails to certain domains in the Zimbra mail server. 1. Open file /opt/zimbra/conf/zmconfigd/smtpd_recipient_restrictions.cf and add this line: check_sender_access lmdb:/opt/zimbra/conf/restricted_senders 2...
Installing the Linux operating system is only the first step toward creating a fully functional departmental server or Web site. Almost all computers are now networked in some way to other devices therefore a basic understanding of networking and...
scp – secure copy (remote file copy program) Syntax scp [-1246BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file] [-l limit] [-o ssh_option] [-P port] -S program] [[user@]host1:]file1 [...] [[user@]host2:]file2 -1Forces scp to use protocol...
MTR is a traceroute tool that tests the network connections or path between your physical location and your hosting server.
SWAP memory is used to help RAM, once it can not store any more data. Here is how to modify and increase SWAP memory on Linux.
When upgrading within the same OS version, old kernels don’t typically get cleaned up automatically. This is to enable you to safely "rollback" to an older kernel version if you experience problems with a newer one.
Domain Name System (DNS) converts the name of a Web site (www.pcx3.com) to an IP address (104.21.70.187). This step is important, because the IP address of a Web site’s server, not the Web site’s name, is used in routing traffic over the...
For most of us it’s not a secret that using Windows nowadays gives you a lot of problems ranging from issues of vulnerability, pricing and even hardware compatibility. Problems like these should be easily resolved if not absent as every second...