Social Profile

251FansLike
528FollowersFollow
33SubscribersSubscribe

How to Install Jenkins in Linux 7 | CentOS 7

0
Jenkins is an open source automation server or tools for continuous integration and continuous delivery (CI/CD) pipelines that are widely used in various sectors....

How to Setup NTP (Network Time Protocol) Server in CentOS/RHEL 7

0
Network Time Protocol: NTP- is a protocol which runs over port 123 UDP at Transport Layer and allows computers to synchronize time over networks...

Q3: Managing Local Users and Groups | RHCSA Exam Questions and...

0
The Red Hat Certified System Administrator (RHCSA) exam is a leading and recognized certification that helps candidates increase, develop and incorporate administrative skills and...

YUM and FTP Server Configuration in RHEL 7 (Step by Step)

0
YUM and FTP Server Configuration
To show the mounted DVD or ISO image of RHEL-7.0. # df  -h /dev/sr0 3.5G 3.5G 0 100% /run/media/root/RHEL-7.0 Server.x86_64 This command will enter the all rpm...

NTP Server Client Configuration using Mikrotik Router and Linux OS

0
NTP-Configuration-featured-image
How to Configure Linux OS as NTP Client with NTP Server as Mikrotik Router: https://www.youtube.com/watch?v=VtHMkPgV_VI

Instant Messaging Server Installation using Openfire in Linux 7

0
Instant Messaging
Openfire is a real time collaboration (RTC) server licensed under the Open Source Apache License. It is also known as Jabber. It uses the...

Cisco

KRACK Attack on Wi-Fi Network

KRACK Attack: How to guarantee Wi-Fi Network Security?

0
KRACK attack made the WPA2 connection vulnerable. And now we must take measures to guarantee our Wi-Fi network security. Therefore, today we explain everything...
fake movie maker

Fake Movie Maker on Internet: Protect you from Hackers!

0
Fake Movie Maker appeared on internet, so hackers improve their tactics every day. That’s why they are using old programs to develop new scams....
Malware Adobe Flash

Malware in Adobe: The New Attack from BlackOasis

0
The Malware in Adobe has given much to talk about and since threats to computer security are the order of the day, today I bring...
wi-fi protection

Wi-Fi protection: Ways to protect Wi-Fi

0
Wi-Fi protection: Why is it so important? It is becoming a serious issue. Already there are several cases where multiple people have been hacked...
Windows 10 Antivirus

Windows 10 Antivirus: Here the Best Antivirus for Windows 10

0
Windows 10 Antivirus is one of the priorities that every user of the window should look for. Therefore, here in technology tips, we bring...
buy cheap iphone

7 Places to Buy Cheap iPhone: Find your iPhone at the...

0
Today, to buy cheap iphone can be a task to which all Apple lovers who cannot buy their new release embark. Here is a...
security apps for android

Top 20: Security Apps for Android you should have!

0
Security apps for Android are important. And we know that Android phones are a gem of technology, so you should take care of security...
Samsung Galaxy S9

Samsung Galaxy S9: Features, price and…innovation?

0
Today, we bring very interesting about what, possibly, is the new Samsung Galaxy S9. After knowing when the mass production will begin and receive...
water resistant mobile

Water Resistant Mobile: Things you should take care

0
Everything you need to know about water resistant mobiles. Surely you've heard about the water resistant mobile, maybe you even have one. What began...
smartphone buying guide

Smartphone Buying Guide: Find the best phone!

0
Today I decided to bring you a smartphone buying guide in technology tips. The smartphone market changes very quickly. In a few months the...
iPhone X news

iPhone X Problems: Read this before buying new iPhone!

0
iPhone X phone was on the market the last weeks, and now some users are talking about some iPhone X problems. However, Apple is...