Menu

How to Install and Configure phpMyAdmin on Fedora 21 How to Install and Configure phpMyAdmin on Fedora 21

Install and Configure phpMyAdmin on Fedora phpMyAdmin  is a free and open source tool written in PHP intended to handle the administrat...

Read more »

How to Install XCache on CentOS 7 How to Install XCache on CentOS 7

Install XCache on CentOS 7 XCache is a fast, stable PHP opcode cacher that has been tested and is now running on production servers unde...

Read more »

How to Install and Configure phpMyAdmin on CentOS 6 How to Install and Configure phpMyAdmin on CentOS 6

Install and Configure phpMyAdmin on CentOS phpMyAdmin is a free and open source tool written in PHP intended to handle the administrati...

Read more »

Linux – Top memory usage by process Linux – Top memory usage by process

Linux – Top memory usage by process Here are a couple of commands to help find top memory wasters . Process – Sorted by occupied ...

Read more »

Remote Desktop to Linux Servers Remote Desktop to Linux Servers

Remote Desktop to Linux Servers Ubuntu Remote Desktop Services (RDS), known as Terminal Services. RDS is Microsoft's implementation ...

Read more »

How To Install Rails and Nginx with Passenger on Ubuntu How To Install Rails and Nginx with Passenger on Ubuntu

Rails and Nginx with Passenger on Ubuntu Ruby on Rails is an open source web application framework which runs on the Ruby programming l...

Read more »

How To Deploy Django on Nginx, Gunicorn with Postgres How To Deploy Django on Nginx, Gunicorn with Postgres

Deploy Django on Nginx, Gunicorn with Postgres Django is a free and open source web application framework, written in Python, which foll...

Read more »

Five Penetration Testing Tools Five Penetration Testing Tools

Five Pentest Tools for you A pentest, short-name for  penetration test , is a software attack which looks for security weaknesses in a ...

Read more »

How To Setup SSH Keys How To Setup SSH Keys

Setup SSH Keys SSH keys are by far the most secure way of logging into your cloud server via SSH. Passwords can be eventually cracked u...

Read more »
 
Top