CentOS / RedHat: Set Password Quality Requirements

In CentOS and Red Hat, you can set password quality requirements using the pwquality module. This module is used by the PAM (Pluggable Authentication Modules) system to enforce password quality policies. Here are the steps to set password quality requirements: Install the libpwquality package if it is not already installed: sudo yum install libpwquality Open … Read more

Gnome Find Drive Serial Number

In GNOME, you can find the serial number of a drive using the Disks utility. Here are the steps: Open the Disks utility by clicking on the Applications menu and searching for “Disks”. In the Disks window, select the drive you want to find the serial number for from the list of drives on the … Read more

Linux / UNIX: Restrict Access To A Given Command

In Linux and UNIX, you can restrict access to a given command using file permissions and ownership, as well as the sudo and chroot commands. Here are some methods to restrict access to a given command: File permissions and ownership: You can set the file permissions and ownership of the command’s binary executable file to … Read more

Samba: Linux Iptables Firewall Configuration

Samba is a popular open-source implementation of the SMB/CIFS protocol, which allows file and printer sharing between different operating systems. If you are running Samba on a Linux server, you may want to configure your iptables firewall to allow Samba traffic. Here are the steps to configure iptables for Samba: Open the iptables configuration file … Read more

Linux Tuning The VM (memory) Subsystem

Tuning the VM (Virtual Memory) subsystem in Linux can help improve performance in systems with memory-intensive workloads. Here are some general tips to help tune the VM subsystem: Adjust the swappiness value: The swappiness value determines how aggressively the kernel will swap out memory pages to disk. A value of 0 disables swapping, while a … Read more

CentOS / Redhat: Protect Yum Repo’s Packages

To protect the packages in your Yum repositories on CentOS/Redhat, you can use GPG (GNU Privacy Guard) to sign the RPM packages and verify their signatures before installing them. Here are the steps: Install the necessary packages to support GPG signing and verification: sudo yum install gnupg2 Generate a GPG key pair that will be … Read more

Redhat / CentOS Install Memcached Caching System

To install Memcached caching system on Redhat/CentOS, you can follow these steps: Update the system’s package cache using the following command: sudo yum update Install Memcached and its dependencies by running the following command: sudo yum install memcached libmemcached Start the Memcached service and enable it to start automatically at boot time using the following … Read more