Articles

Active Apache Connections Check Apache Active Connections: echo "Apache:"; netstat -plan | grep :80 | awk {'print $5'} |... Advanced Bash Environment Variables Tutorial BASH is the shell installed on all servers by default. It is a very powerful shell language... Advanced Bash Loops Tutorial The BASH scripting language provides a very handy ‘loop’ features.  we have discussed that... Apache Live Results Run this: tail -f /home/username/access-logs/domain.com   Connect from Mac OS X to Linux by using Terminal If you use Mac OS X, you don’t need to install a third-party client like PuTTY to connect to your... Control system processes via SSH The hearth of each OS are its (apart from the Kernel of course) processes. Linux provides various... Create/Edit files and folders using SSH cmd line There are various ways you can create a new file using the SSH command line.The easiest and most... Deleting files and folders via SSH Sometimes you would need to remove a file or a folder from the system. To do so using SSH, you... Disable cPHulk Brute Force Protection SSH Run the following command to disable cPHulk for 5 minutes /usr/local/cpanel/etc/init/stopcphulkd... Extracting and creating archive files via SSH Sometimes you would need to extract or create an archive file (i.e to install a script, you would... Filtering the IP from the logs Run this change the IP to any: tail -f /home/username/access-logs/domain.com | grep 000.000.000.000 How to Clear Brute Force Logs via SSH Login into your Server via SSH and enter: echo "delete from brutes; delete from logins;" | mysql... How to open known_hosts in Mac 1. On the Mac, navigate to the ~/.ssh/ folder in Finder. Because files & folders starting... List files and directories using SSH In order to list all files and directories using an SSH client, you would need to execute the... Mac WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! This either means that the host has a new key and the fingerprint has changed or... Managing file/folder permissions and ownership via SSH The Unix files access is controlled. There are three types of access... Move and copy files using SSH Often you will need to move one or more files/folders or copy them to a different location. You... Searching for files/text using SSH In some cases you would need to find the location of a given file or to search for a certain text...
« Back