I have said it before and I am saying it again. Numix is the best theme out there in the Linux world. In this article, we are going to see how to install Numix theme and icons in Ubuntu 15.04. We shall also see how to use change themes in Ubuntu. Read More
White-List or Remove the Rule on the Basis of the Rule ID
Every rule in Mod Security is identified by the Rule ID. We will use this ID to white-list the rule. Let’s look into the rule ID for the following error log which was generated by Mod Security.
You may find yourself faced with a need to generate a ton of random strings of characters.
For example, you may have a list of usernames that need passwords – you could be lazy and say everyone’s password is password, but I will assume you know better than that!
Generate Random Number String
To generate a random number string in Excel, simply use a formula like this:
This will randomly display a number between 0 and 9 each time the page is refreshed. Read More
Shutdown Command Examples
To bring this all together, let’s go over a few examples. First, let’s say that you are connected to your office PC via Remote Desktop and you want to reboot it immediately. You know that no one else is using it and all of your documents and data are saved. While in the Remote Desktop session, launch Command Prompt on your office PC and type the following command:
shutdown -r -f -t 0
The inotify-tools can be used to watch a directory or file for activity and take an action when a file is changed, added, edited or simply read. You can find a workaround (or call it solution) for the absence of the inotify-tools in the repositories here.
Sometimes, for various reasons, a directory needs to be watched for new files, file changes, etc. When a change occurs, a certain action should be taken, like copying the files elsewhere or send an email with to notify someone of the changes. There are a lot of such imaginable scenarios to think of. Read More
Red Hat Enterprise Linux 7 offers a way to partially or fully automate the installation process using a Kickstart file. Kickstart files contain answers to all questions normally asked by the installation program, such as what time zone do you want the system to use, how should the drives be partitioned or which packages should be installed. Providing a prepared Kickstart file at the beginning of the installation therefore allows you to perform the entire installation (or parts of it) automatically, without need for any intervention from the user. This is especially useful when deploying Red Hat Enterprise Linux on a large number of systems at once. Read More
The following shell script splits an IP into separate Octets into its own variables. This method can be used for any script which needs to take each octet into account, such as generating firewall rules etc. Read More
SCP allows files to be copied to, from, or between different hosts. It uses ssh for data transfer and provides the same authentication and same level of security as ssh.
Copy the file “foobar.txt” from a remote host to the local host
$ scp [email protected]:foobar.txt /some/local/directory