Build your own RPMs for Linux

build your own RPM packages

With our step-by-step guide, you can easily build your own RPM packages in Linux on RHEL and CentOS, and efficiently manage software updates and installations. Table of Contents Introduction In the world of Linux, RPM packages are a common way to distribute software packages. RPM stands for “Red Hat Package Manager,” and it was originally […]

Install MySQL on CentOS7 or RHEL7

Install MySQL on CentOS

Unlock the power of relational databases and streamline your data management processes by discovering how to easily install MySQL on CentOS – a must-know skill for any aspiring data professional! Table of Contents Brief History and Overview MySQL was developed by Swedish company MySQL AB (“AB is a Swedish term which means corporation or limited company“) […]

Basic mkdir command examples in Linux

mkdir command examples

In this article, we’ll cover the mkdir command, which stands for make directories, and review basic mkdir command examples. Table of Contents Introduction David Mackenzie authored the mkdir command found in the GNU coreutils package, as documented in the Linux Manual pages. This command, originating in the 1970s, has become ubiquitous across various operating systems, […]

Write a play automating changes to the SSHD Configuration file

Automating changes using Ansible

In today’s Ansible series, we will learn about automating changes using Ansible. Specifically, we will automate changes to the sshd config file. Table of Contents Introduction In this exercise, we will examine a playbook that automates a config change (resolves common SSH vulnerabilities) and …specifically makes a change to the sshd (sshd_config) configuration file on […]

How To Resolve SSH Weak Key Exchange Algorithms on CentOS7 or RHEL7

SSH Weak Key Exchange

In this article, we will discuss SSH Weak Key Exchange Algorithms and how we can resolve them to enhance the security of SSH connections and protect against potential vulnerabilities and unauthorized access. Table of Contents Introduction On October 13, 2021, Tenable published the following SSH Vulnerability: SSH weak key exchange algorithms enabled  giving it a low severity […]

RHEL6: End of Life (EOL)

RHEL6: End of Life

This article outlines the significance of Red Hat Enterprise Linux (RHEL) version 6.X reaching its end-of-life Maintenance II support phase on November 30, 2020, urging users to consider upgrading to RHEL7 or RHEL8.4 to ensure continued technical support and security, while also providing insights into RHEL’s life-cycle phases and support options. Table of Contents Introduction […]

Install PHP7 on CentOS7 or RHEL7

Install PHP7 on CentOS7

In this article, we will review how to Install PHP7 on CentOS7 or RHEL7, empowering you to harness the speed, efficiency, and enhanced features of the latest PHP version for your web development projects. Table of Contents Introduction PHP7, the latest major release of the PHP programming language, brings significant improvements in performance, memory usage, […]

Install Visual Studio (VS) Code on CentOS7

Install VSCode on CentOS

In this article, we review how to install VSCode on CentOS 7, providing step-by-step instructions to ensure a seamless setup of the Visual Studio Code editor on your CentOS 7 Linux system. Table of Contents Introduction If you are a software developer, you have certainly heard of Visual Studio (VS) Code.  It is an open-source […]

Installing Apache Web (HTTP/HTTPS) Server on CentOS7

Install Apache Web Server on CentOS

Looking to establish a reliable and secure web presence? Learn how to Install Apache web server on CentOS and unlock the potential of your website today. Table of Contents Introduction The Apache web server, commonly referred to as an HTTP/HTTPS server, is one of the most popular and widely used web servers in the world. […]

50 Commands Every Linux Sysadmin Should Know

Top 50 Linux commands

In this article, we will review the top 50 Linux commands every Linux Sysadmin should know. Junior-level sysadmins and Linux enthusiasts are familiar with all of these commands and know how to use them. Table of Contents Introduction Before we begin, this is just my subjective view of the what belongs on the top 50 […]