All Stories

Warning – this post was original created by Jason Dixon some yrs ago, its copyright is fully held by samag.com. I copied it here for a track record, If there’s any issue, please let me know. As the pictures in…

Your computer has two timepieces; a battery-backed one that is always running (a.k.a. the hardware, BIOS, or CMOS clock), and another that is maintained by the operating system currently running, it’s called system clock. This document explains how to set…

I have some web servers running for productive purpose, and they all have to send out mails. So a problem comes, how can I config mail forwardings for these servers with only internal network to send out mails to the…

Network is the basis of the communication to your customers, page viewers. without network, computers are of no usage at all, arent they? But most of the guys always pay very little attention to the health of their networks. Generally,…

Wget is one of my favorite tools in Linux/Unix world. Sometimes, you want to download all the rpm, deb, iso, or tgz files and save them into a directory. Sometimes you need to use it to check your web server…

This article will guide you on creating a client-2-server OpenVPN instance. Our goal is to redirect all client traffic to VPN server. That means VPN server would serve as a gateway for local traffic. It’s useful to bypass some STUPID…

This document provides an introduction to NFS as implemented in the Linux kernel. It links to developers’ sites, mailing list archives, and relevant RFCs, and provides guidance for quickly configuring and getting started with NFS on Linux.

dig (as known as “domain internet groper”) is a utility that can talk directly to name servers in order to gather detailed domain name related information. DNS is used to resolve a host name or alias into IP address,so that…

With the help of pipeline, we can copy files between servers very easily. What we need to do is to establish an instant connection between servers, and we often create such a connection by OpenSSH. When the connection is established,…

[By: Showayb Zahda+] Many researchers who are doing performance evaluation and benchmarking need to capture the values of the CPU and the RAM. Others might need to capture the throughput as well. In this short tutorial I will show how…