Social Profile

251FansLike
528FollowersFollow
33SubscribersSubscribe

How to Setup NTP (Network Time Protocol) Server in CentOS/RHEL 7

0
Network Time Protocol: NTP- is a protocol which runs over port 123 UDP at Transport Layer and allows computers to synchronize time over networks...

YUM and FTP Server Configuration in RHEL 7 (Step by Step)

0
YUM and FTP Server Configuration
To show the mounted DVD or ISO image of RHEL-7.0. # df  -h /dev/sr0 3.5G 3.5G 0 100% /run/media/root/RHEL-7.0 Server.x86_64 This command will enter the all rpm...

How to Setup a Complete Mail Server(Postfix) using SquirrelMail(Webmail) in CentOS...

0
A mail server is a server that handles and delivers e-mail over a network or internet. A mail server can receive e-mails from client...

Q3: Managing Local Users and Groups | RHCSA Exam Questions and...

0
The Red Hat Certified System Administrator (RHCSA) exam is a leading and recognized certification that helps candidates increase, develop and incorporate administrative skills and...

Q1: Network Configuration and Hostname Set | RHCSA Exam Questions and...

0
All of us who work with IT Systems are familiar with Red Hat Linux. Nowadays no one cannot expect a job or promotion without...

How to set time, date and timezone using timedatectl in CentOS...

0
rhel 7 time date setup
Redhat Linux 7 have one utility to display and configure date and time information, which is timedatectl. This utility tool is a part of...

Cisco

wi-fi protection

Wi-Fi protection: Ways to protect Wi-Fi

0
Wi-Fi protection: Why is it so important? It is becoming a serious issue. Already there are several cases where multiple people have been hacked...
computer virus

Computer Virus: Most Famous Cyber Attacks in History!

0
The computer virus is becoming a more serious threat. Whether you prefer to call it Malware or virus, you must take into account a...
Terdot Malware

Terdot Malware will steal your Facebook and Twitter Accounts

0
Some days ago a friend talk to me about Terdot Malware, a new and interesting malware that appeared on internet. While talking about it...
KRACK Attack on Wi-Fi Network

KRACK Attack: How to guarantee Wi-Fi Network Security?

0
KRACK attack made the WPA2 connection vulnerable. And now we must take measures to guarantee our Wi-Fi network security. Therefore, today we explain everything...
Malware Adobe Flash

Malware in Adobe: The New Attack from BlackOasis

0
The Malware in Adobe has given much to talk about and since threats to computer security are the order of the day, today I bring...
language translator apps

Best Language Translator Apps for Smartphone our TOP 5!

0
Discover the best language translator apps that help you learn a language better. Do you dream of learning Chinese, German, Spanish or English? Today...
smartphone buying guide

Smartphone Buying Guide: Find the best phone!

0
Today I decided to bring you a smartphone buying guide in technology tips. The smartphone market changes very quickly. In a few months the...
smartphone screen

Smartphone Screen and things you should know now!

0
Nowadays, one of the elements that we value the most when buying a new smartphone is the screen. But sometimes we get lost between...
reset iphone

How to Reset iPhone or iPad or iPod

0
In case you are selling or you want to repair your iPhone or iPad, you may need to reset iphone in order to delete your...
Android Tricks

8 Android Tricks To Make Your Life Easier!

0
The tricks for Android have stopped being used only by programmers. Now more and more people are beginning to understand the importance of knowing...
Kodak Ektra

Kodak Ektra: Photographic Smartphone for Halloween Photography

0
The KODAK EKTRA photo smartphone, created by Eastman Kodak Company and Bullitt Group, is the perfect ally to capture and retouch images. Since, it...