Check LDAP user authentication
IT Infrastructure,Make use of (Lightweight Directory Access Protocol) LDAP user authentication to validate the credentials submitted by the user. LDAP is mainly used in Microsoft’s Active Directory, but it can also be used with other tools like; Open LDAP, Red Hat Directory Servers, and IBM Tivoli Directory Servers for its open and cross-platform protocol. The LDAP…
Read moreInstall Iptables in CentOS 7
IT Infrastructure,In order to install iptables in centos 7, you need to either use firewall-cmd commands or disable firewalld and then enable iptables. This is because firewalld is a replacement of iptables, therefore only one should run at a time. So let’s first disable firewalld. To mask or disable firewalld you can use the below command:…
Read moreHow to remove Docker Containers / Docker Volume?
IT Infrastructure,You can use these steps to quickly remove docker objects like docker container and docker volume that are accumulating your disk space. This will help any docker user to finely organize their system from unwanted storage. Let’s see each one by one. Remove Docker Containers: Remove Docker Containers When you try to stop them, the…
Read moreCheck EasyDcim – Data Center management tool
IT Infrastructure,Iaas (Infrastructure as a Service) is a type of cloud computing that provides virtualized computing resources over the internet. Automated administrative functions, as well as GUI and API-based control, are characteristics of Iaas. We need to choose the best solution to assist us in implementing the required environment. One such tool is EasyDCIM. EasyDCIM Dedicated…
Read moreAvoid Data Breach in Healthcare
IT Infrastructure,Cyberattacks continue to rise, making strong data security a top priority. Healthcare organizations face greater risks than most industries because they store sensitive patient information. Protecting that data helps prevent costly and damaging breaches. Attackers commonly exploit unauthorized access to cloud apps or steal patient details from unprotected files. They also use compromised login credentials…
Read moreCheck Iptables Firewall set up on Centos 6
IT Infrastructure,You can use Iptables to secure your Linux server or VPS. With Iptables you can monitor the traffic of your server using tables, which are a set of rules called chains. Iptables is a flexible firewall tool and few tricks and commands could make working with Iptables much easier. To configure firewall rules for IPv6,…
Read moreSetup YUM Repository on RHEL 8 using DVD
IT Infrastructure,This guide will help you to set up a local yum repository to use locally-mounted DVD with Red Hat Enterprise Linux (RHEL) 8. This local repository lets you save internet bandwidth as well as the time for downloading packages from the internet. Since the packages are downloaded via a local network, the updates will happen…
Read moreCheck if your Linux server is Under DDOS Attack or not!
IT Infrastructure,When your server is under DDoS(Distributed Denial of Service) attack it experiences high inflow of data that depletes the server performance or even leads to server crash. Hence you can login to your server as root and fire the following command, using which you can check if your Linux server is under DDOS attack or…
Read more
