How to Block abusive IP addresses using IPTABLES Firewall in Debian/UbuntuHow to Block abusive IP addresses using IPTABLES Firewall in Debian/Ubuntu

Blocking abusive IP addresses using IPTABLES Firewall In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined…

Read more »
19 Mar 2016

Linux – Top memory usage by processLinux – Top memory usage by process

Linux – Top memory usage by process Here are a couple of commands to help find top memory wasters. Process – Sorted by occupied memory(2 column)1 ps -e -orss=,pid=,args= | sort -nr | head|awk '{print…

Read more »
10 Mar 2016

Shell Script : Find All Zip / Rar Files Then Unzip / UnrarShell Script : Find All Zip / Rar Files Then Unzip / Unrar

Find All Zip / Rar Files Then Unzip / Unrar We must first install and enable RPMForge repository under Linux systems to install Unrar and Rar command-line applications. We have provided RPMForge repo…

Read more »
19 Feb 2016

Command Line Arguments in Linux Shell Scripting

Command Line Arguments in Linux Shell Scripting Overview : Command line arguments (also known as positional parameters) are the arguments specified at the command prompt with a command or script to b…

Read more »
12 Feb 2016
 
Top