An up-to-date Zabbix Server backup will allow you to quickly restore the monitoring system configuration in case of software failures or hardware failures.
The Select-Object cmdlet allows you to display certain properties of an object in a PowerShell command. Select-Object can select unique objects, a specified number of objects, or objects at a specified position in an array. Also, some PowerShell cmdlets don’t display all of the object’s properties, and you must use Select-Object to display additional attributes.
Continue reading “Select-Object: Filtering Output in PowerShell”
In this article, we have described the basic configuration settings that must be set when deploying a standalone server with MySQL or MariaDB. We’ll look at the initial configuration parameters that must be checked before starting the server.
Continue reading “Getting Started with MySQL/MariaDB Initial Configuration”
Python has a built-in module to quickly start a simple HTTP server. To run it, use the command:
If you need to take a screenshot of websites via the Linux server console, you can use the screenshoter (https://github.com/mingalevme/screenshoter). This is an HTTP service in a Docker container based on Google Puppeteer.
Continue reading “How to Take WebSite Screenshots from Linux Terminal?”
In this article, we’ll show you how to fix the broken tab completion feature in the Linux bash console.
Continue reading “Bash Tab Autocomplete Not Working on Linux”
On Linux, you can use the DisLocker tool to access data on a partition that is encrypted with Windows BitLocker. In this example, we’ll show how to decrypt data on a BitLocker partition in Linux.
Continue reading “Mounting BitLocker-Encrypted Windows Drive in Linux”
Ceph is an open-source software-defined distributed file system. Ceph allows you to create a fault-tolerant distributed data storage available over the TCP/IP protocol. Ceph offers several storage access interfaces: object, block, and file. In this article, we’ll show how to install and configure a ceph cluster using the Quincy release (17) in this example.
Continue reading “How to Install and Configure a Ceph Storage Cluster?”
In Linux, two commands are available to add a new user, useadd and adduser. What is the difference between useradd and adduser, and which one is better to use for creating new users in Linux?
You can use the iptables-tracer tool to trace packets in iptables chains as they pass through the Linux firewall. This tool allows you to understand if traffic is passing through certain iptables chains.