Trending Now
How to Install Jenkins in Linux 7 | CentOS 7
Jenkins is an open source automation server or tools for continuous integration and continuous delivery (CI/CD) pipelines that are widely used in various sectors....
Q3: Managing Local Users and Groups | RHCSA Exam Questions and...
The Red Hat Certified System Administrator (RHCSA) exam is a leading and recognized certification that helps candidates increase, develop and incorporate administrative skills and...
YUM and FTP Server Configuration in RHEL 7 (Step by Step)
To show the mounted DVD or ISO image of RHEL-7.0.
# df -h
/dev/sr0 3.5G 3.5G 0 100% /run/media/root/RHEL-7.0 Server.x86_64
This command will enter the all rpm...
How to Install Jenkins in Linux 7 | CentOS 7
Jenkins is an open source automation server or tools for continuous integration and continuous delivery (CI/CD) pipelines that are widely used in various sectors....
How to set time, date and timezone using timedatectl in CentOS...
Redhat Linux 7 have one utility to display and configure date and time information, which is timedatectl. This utility tool is a part of...
How to Setup a Complete Mail Server(Postfix) using SquirrelMail(Webmail) in CentOS...
A mail server is a server that handles and delivers e-mail over a network or internet. A mail server can receive e-mails from client...
NTP Server Client Configuration using Mikrotik Router and Linux OS
How to Configure Linux OS as NTP Client with NTP Server as Mikrotik Router:
https://www.youtube.com/watch?v=VtHMkPgV_VI
Malware in Adobe: The New Attack from BlackOasis
The Malware in Adobe has given much to talk about and since threats to computer security are the order of the day, today I bring...
Terdot Malware will steal your Facebook and Twitter Accounts
Some days ago a friend talk to me about Terdot Malware, a new and interesting malware that appeared on internet. While talking about it...
Computer Virus: Most Famous Cyber Attacks in History!
The computer virus is becoming a more serious threat. Whether you prefer to call it Malware or virus, you must take into account a...
KRACK Attack: How to guarantee Wi-Fi Network Security?
KRACK attack made the WPA2 connection vulnerable. And now we must take measures to guarantee our Wi-Fi network security. Therefore, today we explain everything...
Types of computer virus: List of computer viruses!
There are many types of computer virus today. However, here we present a list of most common viruses so that you are attentive and...
iPhone X News: Release Date, Price & New Features
The newly released iPhone X has joined the iPhone 8 and iPhone 8 plus in the new Apple line up that was released recently....
Cool Tricks for iPhone 8 you should know!
The Cool tricks for iPhone 8 are incredible, and if you seemed to know everything about this piece of apple art, you're wrong. The...
7 Places to Buy Cheap iPhone: Find your iPhone at the...
Today, to buy cheap iphone can be a task to which all Apple lovers who cannot buy their new release embark. Here is a...
Water Resistant Mobile: Things you should take care
Everything you need to know about water resistant mobiles. Surely you've heard about the water resistant mobile, maybe you even have one. What began...
iPhone X Problems: Read this before buying new iPhone!
iPhone X phone was on the market the last weeks, and now some users are talking about some iPhone X problems. However, Apple is...
Top 20: Security Apps for Android you should have!
Security apps for Android are important. And we know that Android phones are a gem of technology, so you should take care of security...