Monthly Archives: February 2012

Uses Of SSH Client Commands In Your Linux Server

Uses Of SSH Client Commands In Your Linux Server :

SSH allows you to connect to a remote computer – for example, your Web server. This protocol allows commands to be carried out on that computer, such as moving and copying files, creating directories (folders), and running scripts. A SSH client should be installed on your computer to be able to talk to the remote server.

A. The ls command

LS is stands for “list”. Ls helps user to lists all the files and directories in their current directory. User have to type ls and press Enter to find out a listing appear in the terminal window:

[email protected]:~$ ls
myfile.txt   myfile2.txt   mysite.com

B. The cd command

Cd stands for “change directory”. User can able to to move into and out of directories, much like double-clicking folders on his/her PC with cd command. Such as, if ownsite.com listed above is the directory containing user’s website, he/she can move into the directory as follows:

[email protected]:~$ cd ownsite.com

User can then do another ls to list the contents of the ownsite.com directory:

[email protected]:~/mysite.com$ ls
cgi-bin   htdocs   logs

To move back up a directory, use cd .. (“..” means “the parent directory”). After use this, user can be back in original directory:

[email protected]:~/mysite.com$ cd ..
[email protected]:~$ ls
myfile.txt   myfile2.txt   mysite.com

C. The pwd command

Its important to know your exact current directory. To find this out, type the command pwd (short for “print working directory”) and press Enter. The computer displays the full path to the current directory.

[email protected]:~$ pwd
/home/users/username/

D. The more command

To quickly browse through the contents of a text file on your server. Just type more followed by the name of your file, and press Enter:

[email protected]:~$ more myfile.txt Project Gutenberg's The Complete Works of Artemus Ward, Part 1 #1 of this seven part series by Charles Farrar Browne Copyright laws are changing all over the world, be sure to check the laws for your country before redistributing these files!!! Please take a look at the important information in this header. We encourage you to keep this file on your own disk, keeping an electronic path open for the next readers. Please do not remove this. This should be the first thing seen when anyone opens the book. Do not change or edit it without written permission. The words are carefully chosen to provide users with the information they --More--(16%) read more

Uses Of Grep Command In Unix And Linux Server

Uses Of Grep Command In Unix And Linux Server

The name, “grep” is indicative of the operation which this command performs. It is executed using the Unix/Linux text editor ed: g/re/p

* grep Command Syntax

grep'word' filename
grep'string1 string2'  filename
cat otherfile | grep'something'
command | grep'something'
command option1 | grep'data'
grep --color 'data' fileName

* Way To Search File With grep Command :

Search /etc/passwd for boo user:
$ grep boo /etc/passwd

User can force grep to ignore word case. Such as, match boo, Boo, BOO and another combination with -i option:
$ grep -i "boo" /etc/passwd read more

Process To Check LAMP Version

When managing several servers with different operating systems and versions, you might not be able to identify the LAMP version being used, it could happen with the client too. Here is a small method to check the LAMP version.

1) Linux Version:-
[[email protected] ~]# cat /etc/redhat-release
Red Hat Enterprise Linux Server release 6.1 (Santiago)

[[email protected] ~]# uname -a
Linux node1.oriensoft.com 2.6.32-042stab032.1 #1 SMP Sat Aug 13 18:16:00 MSD 2011 x86_64 x86_64 x86_64 GNU/Linux

As per above out put Operating System is RHEL 6.1 (64-Bit). read more

eNlight cloud computing hosting services by bodhost

eNlight cloud computing by Bodhost

eNlight cloud computing to be launched on bodhost which is a new technology to serve all our existing and new customers with features as :

a. Auto-scale :

Auto-scaling means that you can automatically assign computing resources by adding or removing capacity as per need in a cloud infrastructure. Today’s business requires a lot of computing resources and on-demand services.

eNlight cloud computing infrastructure automatically scales resources as per need integrated with billing system. You do not require a reboot of the server to increase or decrease the CPU or RAM resources. read more

Uses of Tar Command in Unix and Linux Server

Uses of Tar Command in Unix and Linux Server :

For archiving purposes on the Unix platform, tar command is command to be used. Knowing the various tar command options will help you to be a master of the archive file manipulation.

A. Create an archive with tar command

* Create an uncompressed tar archive with option cvf

It is the most basic command to create a tar archive.

$ tar cvf archive_name.tar dirname/
Note :
c – create a new archive
v – verbosely list files which are processed.
f – following is the archive file name

* Create a tar gzipped archive with option cvzf

The above used tar cvf, can’t offer any compression. So, if you want to utilize a gzip compression on the tar archive then you can utilize the z option as follows.

$ tar cvzf archive_name.tar.gz dirname/
Note :
z – filter the archive through gzip

Note:

.tgz is similar as .tar.gz

* Create a bzipped tar archive with option cvjf

Create a bzip2 tar archive as shown below:

$ tar cvfj archive_name.tar.bz2 dirname/
Note :
j – filter the archive through bzip2

Note:

.tbz and .tb2 is similar as .tar.bz2

B. Extracting (untar) an archive with tar command

* Extract a *.tar file with option xvf

Extract a tar file with option x as shown below:

$ tar xvf archive_name.tar
Note :
x – extract files from archive

* Extract a gzipped tar archive ( *.tar.gz ) with option xvzf

Use the option z for uncompressing a gzip tar archive.

$ tar xvfz archive_name.tar.gz

* Extract a bzipped tar archive ( *.tar.bz2 ) with option xvjf

Use the option j for uncompressing a bzip2 tar archive.

$ tar xvfj archive_name.tar.bz2

C. Listing an archive with tar command

* View the tar archive file content without extracting with option tvf

You can find out the *.tar file content before extracting as shown below.

$ tar tvf archive_name.tar

* View the *.tar.gz file content without extracting with option tvzf

You can find out the *.tar.gz file content before extracting as shown below.

$ tar tvfz archive_name.tar.gz read more

Way To Increase Remote Session Time In Your Linux Server

Increase Linux server remote session time :-

Put the below option in sshd_config file under /etc/ssh/ directory.

ClientAliveInterval 180

[[email protected] ~]# cd /etc/ssh/
[[email protected] ssh]# pwd
/etc/ssh
[[email protected] ssh]# ll
total 200
-rw——- 1 root root 132839 Mar 31 2010 moduli
-rw-r–r– 1 root root 1827 Mar 31 2010 ssh_config
-rw——- 1 root root 3324 Nov 18 18:30 sshd_config
-rw——- 1 root root 668 Nov 17 00:49 ssh_host_dsa_key
-rw-r–r– 1 root root 590 Nov 17 00:49 ssh_host_dsa_key.pub
-rw——- 1 root root 963 Nov 17 00:49 ssh_host_key
-rw-r–r– 1 root root 627 Nov 17 00:49 ssh_host_key.pub
-rw——- 1 root root 1675 Nov 17 00:49 ssh_host_rsa_key
-rw-r–r– 1 root root 382 Nov 17 00:49 ssh_host_rsa_key.pub
[[email protected] ssh]# read more

Cloud computing infrastructure and operations management

Hosting your cloud hosting platform on virtualization delivers better business stability and reduces operating and other expense. You can easily manage higher infrastructure level.

Management of virtual and cloud servers infrastructure requires platform automation and integration solutions that includes performance, capacity and management of configuration.

Infrastructure setup on cloud computing improves operational efficiency and management. Cloud computing technology dynamically manages the nature of virtualization and infrastructure. It improves platform of embedded management and achieves approach towards achievement towards cloud infrastructure health. read more

What are the technical security benefits of cloud computing ?

a. Centralised Data :

Cloud Computing allows data to be centralized and to process faster and cheaper when compared to hard disks, backup devices and other storage.

b. Incident Analyses :

In case of analyses of Cloud computing setup on Infrastructure as a Service, you can setup an offline cloud instance and bring it online when required. In cloud computing, you can only pay for the storage which can be used at a later when required. You can clone your cloud servers and make them available as when required. A system which is better than RAID, and can also reduce the downtime. Cloud servers are relatively fast and made faster to replicate the file system. You can also decrease time to access protect documents. read more

Cloud Server Hosting Contract Agreement

1. Contract between cloud server hosting provider and client :

It’s always better to have a contract between you and cloud hosting provider directly rather than involving your client.

2. All security measures should be mentioned into contract :

You need to understand how the cloud server hosting provider secures the system. Check for audit report and certifications which are required and should also include applications, infrastructure and configurations.

3. Investigate backgrounds :

You need to investigate about the cloud hosting provider’s background and reviews including technical professionals skills added in the contract. read more

PuTTY Utility

PuTTY is a terminal emulator. The client part supports the protocols:

  • SSH
  • Telnet
  • rlogin
  • TCP crude

This is Free Software released under the MIT license. Its main features are:

  • Retains the settings of the hosts and their preferences for future use.
  • Control the encryption key and the version of the SSH protocol.
  • It includes an SFTP client command line called psftp.
  • It includes an SCP client command line called pscp.
  • Allows control of the port translation (port forwarding) on ​​SSH dynamic local and remote.
  • Supports IPv6.
  • Supports encryption 3DES, AES, Arcfour, Blowfish, DES.
  • Supports public key authentication.
  • Supports Telnet, SSH, and rlogin, and RS-232.
  • There is a command line version called Plink.
  • No installation is necessary; simply run the downloaded executable to use.
  • read more