Social Profile

251FansLike
528FollowersFollow
33SubscribersSubscribe

YUM and FTP Server Configuration in RHEL 7 (Step by Step)

0
YUM and FTP Server Configuration
To show the mounted DVD or ISO image of RHEL-7.0. # df  -h /dev/sr0 3.5G 3.5G 0 100% /run/media/root/RHEL-7.0 Server.x86_64 This command will enter the all rpm...

How to Setup NTP (Network Time Protocol) Server in CentOS/RHEL 7

0
Network Time Protocol: NTP- is a protocol which runs over port 123 UDP at Transport Layer and allows computers to synchronize time over networks...

Q1: Network Configuration and Hostname Set | RHCSA Exam Questions and...

0
All of us who work with IT Systems are familiar with Red Hat Linux. Nowadays no one cannot expect a job or promotion without...

Primary DNS Server Installation and Configuration in CentOS 7

0
Primary DNS
Today i will show you how to install and configure DNS Server step by step. I will install and configure Primary DNS Server in...

How to Setup a Complete Mail Server(Postfix) using SquirrelMail(Webmail) in CentOS...

0
A mail server is a server that handles and delivers e-mail over a network or internet. A mail server can receive e-mails from client...

Q3: Managing Local Users and Groups | RHCSA Exam Questions and...

0
The Red Hat Certified System Administrator (RHCSA) exam is a leading and recognized certification that helps candidates increase, develop and incorporate administrative skills and...

Cisco

encrypted messages gmail

How to use Encrypted messages Gmail and why?

0
How to use encrypted messages Gmail? Encrypted messages Gmail aren’t new, but if you want to improve your IT security, you should read this. Nowadays,...
wi-fi protection

Wi-Fi protection: Ways to protect Wi-Fi

0
Wi-Fi protection: Why is it so important? It is becoming a serious issue. Already there are several cases where multiple people have been hacked...
KRACK Attack on Wi-Fi Network

KRACK Attack: How to guarantee Wi-Fi Network Security?

0
KRACK attack made the WPA2 connection vulnerable. And now we must take measures to guarantee our Wi-Fi network security. Therefore, today we explain everything...
computer virus

Computer Virus: Most Famous Cyber Attacks in History!

0
The computer virus is becoming a more serious threat. Whether you prefer to call it Malware or virus, you must take into account a...
Malware Adobe Flash

Malware in Adobe: The New Attack from BlackOasis

0
The Malware in Adobe has given much to talk about and since threats to computer security are the order of the day, today I bring...
smartphone buying guide

Smartphone Buying Guide: Find the best phone!

0
Today I decided to bring you a smartphone buying guide in technology tips. The smartphone market changes very quickly. In a few months the...
smartphone screen

Smartphone Screen and things you should know now!

0
Nowadays, one of the elements that we value the most when buying a new smartphone is the screen. But sometimes we get lost between...
security apps for android

Top 20: Security Apps for Android you should have!

0
Security apps for Android are important. And we know that Android phones are a gem of technology, so you should take care of security...
water resistant mobile

Water Resistant Mobile: Things you should take care

0
Everything you need to know about water resistant mobiles. Surely you've heard about the water resistant mobile, maybe you even have one. What began...
razer phone

Razer Phone: First Smartphone for Gamers!

0
Razer Phone is on the table, and now we have the first Smartphone for gamers. Only the gamers will know this masterpiece that will...
iPhone X news

iPhone X News: Release Date, Price & New Features

0
The newly released iPhone X has joined the iPhone 8 and iPhone 8 plus in the new Apple line up that was released recently....