How to start lerning Linux

Most Relevant Content

  • Getting Started with Red Hat Linux

    Red Hat Linux is an open source server operating system.  Although open source Red Hat is a commercial Linux distribution. So, most of the Linux administrators use CentOS because CentOS is a free and open source, enterprise-class and community-supported  server platform as well as it is functionally compatible with Red Hat Enterprise Linux. In my previous article, I showed how to install CentOS 7 core packages in your server machine. Today I will introduce you with Red Hat Linux’s command prompt as well as 11 important commands that are always used for Linux administration. If you are new in this article as well as Red Hat Linux operating system, install CentOS 7 according to my previous article and then continue the rest of this article. Introduction with Red Hat Linux Command Prompt If you do not install CentOS yet, please complete CentOS 7 core (minimal packages) installation according to my previous article. I always suggest you to install CentOS core installation because Red Hat Linux is mainly used for server platform. So, if you use CentOS Desktop, your server will be bulky as well as server overhead will increase. It may impact of your server performance. On the other hand, [...]

    READ MORE »

  • You May Also Like

  • »

    MikroTik PPPoE Server Configuration with freeRADIUS Server |   January 20, 2019

    PPPoE Service is one of the most popular services in MikroTik Router. It is specially used by the local ISP provider for the simplicity of client connection. MikroTik PPPoE Service accepts user or client authentication and authorization both MikroTik local user database and RADIUS user database. RADIUS Server provides an efficient way to manage user authentication, authorization and accounting.  FreeRADIUS is a high performance RADIUS suite that provides user authentication, authorization and accounting facility for a number of network devices [...]

    READ MORE »

  • »

    How to Create Free SSL/TLS Certificate with OpenSSL |   July 23, 2021

    SSL/TLS certificate is required to encrypt data sent over internet communication. Without encryption, the sent data can be hacked by the middle man attack. SSL/TLS certificate is usually a pair key, public key and private key, solution where data is encrypted with public key and decrypted with private key. In public communication, public key is required to be signed by a CA (certificate authority) but in private communication, there is no need to be signed by any CA. If we [...]

    READ MORE »

  • »

    MikroTik Send Browsing Log to Remote Syslog Server |   August 18, 2019

    MikroTik RouterOS is capable of logging various system events as well as user browsing information. Logs can be saved in router’s memory (RAM), disk, file, sent by email or even sent to remote syslog server. Sometimes it may require saving user browsing log by the law. So, a syslog server is an essential part to any network. In this article, I will discuss how to configure MikroTik Router to keep user browsing log and send that log to remote syslog [...]

    READ MORE »

  • »

    How to Block WiFi Access although Password is Known |   April 23, 2024

    We usually get internet connection from any ISP and buy any WiFi Router and then configure wireless/AP with password and configure DHCP Server to get connection from own WiFi devices. We use these WiFi Routers/APs at home, office, workspace or any other public places. Usually, we get connected to our WiFi using our provided WiFi password. Initially there will be no problem to keep your network safe using password authentication. But day by day your password will be known by [...]

    READ MORE »

  • »

    MikroTik Wireless AP Configuration with DHCP using Winbox |   October 22, 2019

    MikroTik Wireless Router is one of the most popular and stable WiFi Routers. WiFi Zone for an ISP or for an office or for a home can easily be configured with MikroTik WiFi Router. MikroTik has a lot of WiFi Routers that can be used as a WiFi Access Point (AP), a WiFi Station or a WiFi Repeater. MikroTik Wireless Router can also be used as both WiFi Station and WiFi AP simultaneously. The simple usage of MikroTik Wireless Router [...]

    READ MORE »

  • »

    MikroTik Bandwidth and Resource Monitoring with Graphs |   January 31, 2018

    “Am I getting my committed bandwidth?” is a common question to any network administrator. This question may arise either from your customer or from your owner if you are an employee of any organization. If you feel boring hearing this question and want to establish a system where your customer will be able to inspect his bandwidth usage, MikroTik Graphing is your best friend. MikroTik Graphing can be used to display graphics for traffic which is passed through interfaces and [...]

    READ MORE »

  • »

    How to Assign Static IP Address in Windows OS |   September 16, 2015

    Communication between one computer to another computer or server is established with IP addresses. Without IP address no communication is possible in computer network. An Internet Protocol (IP) Address is a numerical value or label assigned to each electronic device (e.g., computer, smartphone and printer) which uses Internet Protocol for communication. IP can be assigned both dynamically and statically on a IP devices. Dynamic IP is assigned by a DHCP server. If a DHCP server is present in a network, [...]

    READ MORE »

  • »

    MikroTik VPN Configuration with Site-to-Site PPTP |   February 19, 2018

    VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network and using this VPN tunnel a private network user can send and receive data to any remote private network as if his/her network device was directly connected to that private network. MikroTik PPTP is a popular client-server VPN service that provides a secure and encrypted link across public network. MikroTik PPTP can be applied in two methods. Connecting remote workstation/client: In this [...]

    READ MORE »

  • »

    MikroTik Router Web Proxy Configuration |   August 28, 2016

    A Proxy Server is usually placed between users and the internet so that the proxy server can track the activities of any user. Formerly, a proxy server was mainly used for caching the static content of any web server because the internet speed was too slow. So, users would get high speed for browsing as if they were browsing a local server. But nowadays the internet bandwidth has increased. So, the proxy server is usually not used for web caching [...]

    READ MORE »