Social Profile

251FansLike
528FollowersFollow
33SubscribersSubscribe

Q1: Network Configuration and Hostname Set | RHCSA Exam Questions and...

0
All of us who work with IT Systems are familiar with Red Hat Linux. Nowadays no one cannot expect a job or promotion without...

Q3: Managing Local Users and Groups | RHCSA Exam Questions and...

0
The Red Hat Certified System Administrator (RHCSA) exam is a leading and recognized certification that helps candidates increase, develop and incorporate administrative skills and...

YUM and FTP Server Configuration in RHEL 7 (Step by Step)

0
YUM and FTP Server Configuration
To show the mounted DVD or ISO image of RHEL-7.0. # df  -h /dev/sr0 3.5G 3.5G 0 100% /run/media/root/RHEL-7.0 Server.x86_64 This command will enter the all rpm...

Primary DNS Server Installation and Configuration in CentOS 7

0
Primary DNS
Today i will show you how to install and configure DNS Server step by step. I will install and configure Primary DNS Server in...

How to set time, date and timezone using timedatectl in CentOS...

0
rhel 7 time date setup
Redhat Linux 7 have one utility to display and configure date and time information, which is timedatectl. This utility tool is a part of...

How to Setup Local DNF Repository on RHEL 8 Server using...

0
Local YUM or DNF Server
Finally Red Hat released their best optimized operating system “RHEL 8“. They have changed many features and increased performances than the previous version of...

Cisco

Malware Adobe Flash

Malware in Adobe: The New Attack from BlackOasis

0
The Malware in Adobe has given much to talk about and since threats to computer security...
Protect PC from Malware

How to Protect PC from Malware with these 5 Tools

0
Today, To Protect PC from malware, one of the most pervasive threats to computers and...
encrypted messages gmail

How to use Encrypted messages Gmail and why?

0
How to use encrypted messages Gmail? Encrypted messages Gmail aren’t new, but if you want to...
computer virus

Computer Virus: Most Famous Cyber Attacks in History!

0
The computer virus is becoming a more serious threat. Whether you prefer to call it...
types of computer virus

Types of computer virus: List of computer viruses!

0
There are many types of computer virus today. However, here we present a list of...
security apps for android

Top 20: Security Apps for Android you should have!

0
Security apps for Android are important. And we know that Android phones are a gem of technology, so you should take care of security...
buy cheap iphone

7 Places to Buy Cheap iPhone: Find your iPhone at the...

0
Today, to buy cheap iphone can be a task to which all Apple lovers who cannot buy their new release embark. Here is a...
razer phone

Razer Phone: First Smartphone for Gamers!

0
Razer Phone is on the table, and now we have the first Smartphone for gamers. Only the gamers will know this masterpiece that will...
Android Tricks

8 Android Tricks To Make Your Life Easier!

0
The tricks for Android have stopped being used only by programmers. Now more and more people are beginning to understand the importance of knowing...
Kodak Ektra

Kodak Ektra: Photographic Smartphone for Halloween Photography

0
The KODAK EKTRA photo smartphone, created by Eastman Kodak Company and Bullitt Group, is the perfect ally to capture and retouch images. Since, it...
reset iphone

How to Reset iPhone or iPad or iPod

0
In case you are selling or you want to repair your iPhone or iPad, you may need to reset iphone in order to delete your...