Common Linux Commands You Should Know

In the previous 3 posts, we have covered several Linux terms that you should know when getting started managing a Linux server. What follows are some actual commands that will help you as you begin your journey.
cd – Probably the command you will use most frequently, “cd” stands for “change directory”. From the command […]

5 More Basic Server Security Tips

In a previous post, we highlighted some crucial security measures you should adopt to keep your dedicated server safe. What follows are five more tips that are of equal or even greater importance.
1. Restrict root – Root, the administrator or super user has full control of your server. Ideally, only one person should be […]

How do I Greet Linux Users with a Login Message?

There may be times when you want to send a message to your server users that they all can see when they log in. While “wall” allows you to send messages to currently logged in users, you need a different tool to make sure all users get it whenever they happen to log […]

Pushing the Boundaries of Server Hardware

Server hardware is constantly evolving, and as a dedicated server administrator, it is a good idea to stay abreast on the latest technology and find out where server technology is headed in the future. The following are some of the new technology that has recently been released or is coming soon.
72-core processor – Do […]

What Are Shadow Passwords?

On a basic Linux system, passwords are stored in the /etc/passwd file. This is usually OK for a single-user system, but on a multi-user system, such as a server, the passwords should be hidden and encrypted. Shadow passwords allow you to do just that . On Red Hat Enterprise Linux and CentOS, the shadow-utils package […]

How to Remove MySQL Databases and Users

You may spend a good portion of any given day adding users and databases to your MySQL server, but you might not spend much time removing them, even after you or your users no longer need them. Nevertheless, it is very important to not leave unattended databases and users lying around for would-be attackers […]

A Basic Guide to SSH Server Connections: Part 2

Connecting to an SSH server is usually pretty straightforward, and your login credentials are encrypted for security. This makes SSH useful for other types of connections beyond basic shell access. Backup/syncing tools like rsync can use it, and file transfer programs like SCP for SFTP can use SSH technology for secure file transfers.
In part one, […]

Back to the Basics #11: Secure Shell (SSH)

If you are new to dedicated servers, your primary experience with hosting management has probably been from within the comfortable pages of a web-based control panel. Without a doubt, control panels like cPanel/WHM provide system administrators with robust tools to tackle most of the issues they may encounter. Nevertheless, there will still be times when […]

How to Disable Direct Root Login

On a Linux server, root is the administrator of everything, the king of the hill. Root can do whatever he wants, whenever he wants. With full access and full privileges, root is the most powerful user on the server. While it may be convenient to login to your server as root and get to work, […]

What to Do When You Forget Your Password

One of the worst feelings you can experience after putting so much time and effort into your dedicated server is to suddenly realize you are unable to control it. Aside from security breaches, the most common reason for this is that you forgot your password. Forgetting a user password is unfortunate, but not the end […]

SUDO vs SU: What Really Matters

If you spend a decent amount of time talking to people in the Linux and free software community, you are bound to stumble upon the sudo vs su debate.  Some system administrators swear by sudo and argue it is the only way to truly keep your administrative account secure.  Others argue in favor of su, […]