Archive for May, 2012


How to Set Processor Affinity for a Specific Task

Linux operating systems work very well with multi-processor servers. Today’s dedicated servers almost always have multiple processors or cores. When you have 4, 8, or even more logical CPUs, you can use Linux’s scheduling system to assign specific tasks to individual CPUs. As long as the task is assigned to that particular CPU, it will […]

How to Setup and Use KVM: Part 3

This is the third part of a series on KVM. If you have not already read them, you should begin with part 1 and continue with part 2.
Once you have KVM installed, you should make sure that you have libvirt installed as well. If not, install it now.
# yum install libvirt
Next, […]

CP (Copy) File Settings in Linux and Unix

Many of today’s dedicated servers run Linux distributions (such as CentOS) or Unix-like operating systems (such as FreeBSD). Therefore, it is very important to be familiar with Unix commands and how to get the most out of them, even if you spend most of your time managing your server from the comfort of a web-based […]

How to Reinstall a Package with YUM

In the event that something happens to the software you have installed on your server, you may need to reinstall it. YUM, the package manager for Red Hat Enterprise Linux, Fedora, and CentOS, allows you to reinstall packages whenever necessary.
To reinstall a package with YUM, do the following:
# yum reinstall name-of-package
YUM will prompt you before […]

Working with Hidden Files in Linux

Linux dedicated servers have a very easy system for making files hidden. In general this is not an ironclad security measure but can be used to prevent users from accidentally disturbing critical configuration directories or files. You might also use it to trim down directories to make only the files you actually need access to […]

How to Setup and Use KVM: Part 2

This guide will describe how to install and setup KVM on a Red Hat/CentOS server. The end result will be a system capable of hosting multiple virtual machines, all of which operate on a bridge network, meaning they are equally accessible within the same LAN and would appear to a remote user as though they […]

How to Setup and Use KVM: Part 1

Virtualization is one of most important advancements in computing. It allows the user to run one operating system within another, accessing and interacting with the hardware as though it were running natively. Over the past decade, the technology has progressed to the point where you can now run a virtual machine at nearly the same […]

How to Use SFTP to Transfer Files

One of the oldest methods for transferring files from your computer to your server is called FTP (file transfer protocol). Unfortunately, this method is not secure, and if you need to transfer sensitive data and also protect your username and password, you should use a method that provides better security. SFTP is one option.
Most modern […]