Linux operating systems work very well with multi-processor servers. Today’s dedicated servers almost always have multiple processors or cores. When you have 4, 8, or even more logical CPUs, you can use Linux’s scheduling system to assign specific tasks to individual CPUs. As long as the task is assigned to that particular CPU, it will […]
Archive for May, 2012
Many of today’s dedicated servers run Linux distributions (such as CentOS) or Unix-like operating systems (such as FreeBSD). Therefore, it is very important to be familiar with Unix commands and how to get the most out of them, even if you spend most of your time managing your server from the comfort of a web-based […]
In the event that something happens to the software you have installed on your server, you may need to reinstall it. YUM, the package manager for Red Hat Enterprise Linux, Fedora, and CentOS, allows you to reinstall packages whenever necessary.
To reinstall a package with YUM, do the following:
# yum reinstall name-of-package
YUM will prompt you before […]
Linux dedicated servers have a very easy system for making files hidden. In general this is not an ironclad security measure but can be used to prevent users from accidentally disturbing critical configuration directories or files. You might also use it to trim down directories to make only the files you actually need access to […]
This guide will describe how to install and setup KVM on a Red Hat/CentOS server. The end result will be a system capable of hosting multiple virtual machines, all of which operate on a bridge network, meaning they are equally accessible within the same LAN and would appear to a remote user as though they […]
Virtualization is one of most important advancements in computing. It allows the user to run one operating system within another, accessing and interacting with the hardware as though it were running natively. Over the past decade, the technology has progressed to the point where you can now run a virtual machine at nearly the same […]
One of the oldest methods for transferring files from your computer to your server is called FTP (file transfer protocol). Unfortunately, this method is not secure, and if you need to transfer sensitive data and also protect your username and password, you should use a method that provides better security. SFTP is one option.
Most modern […]