15 Oct, 2025
7 mins read

How to use 12 practical ping command examples in linux

Description Ping is a simple, widely used, cross-platform networking utility for testing if a host is reachable on an Internet Protocol (IP) network. It works by sending a series of Internet Control Message Protocol (ICMP) ECHO_REQUEST messages to the target host and waiting for an ICMP echo reply (or ECHO_RESPONSE). You can run a ping test in order to establish if your computer can communicate […]

2 mins read

How to disable SSH Root login in Linux

Description The root account is often the most targeted account by crackers via SSH under Linux. An enabled SSH root account on a Linux server exposed to a network or, worse, exposed in Internet can pose a high degree of security concern by system administrators. The SSH root account should be disabled in all cases in Linux in order […]

2 mins read

How To Create a Linux Swap File

Description We will explain swap space, and learn how to create swap space using a swap file in Linux: this is important in case we don’t have a swap partition created on the hard disk. Swap space/partition is space on a disk created for use by the operating system when memory has been fully utilized. […]

3 mins read

How to create a virtual HardDisk volume using a File in Linux

Description Virtual Hard Disk (VHD) is a disk image file format which represents a virtual hard disk drive, capable of storing the complete contents of a physical hard drive. It’s a container file that acts similar to a physical hard drive. The disk image replicates an existing hard drive and includes all data and structural features. […]

6 mins read

How to disable root account in Linux using 4 ways

Description The root account is the ultimate account on a Linux and other Unix-like operating systems. This account has access to all commands and files on a system with full read, write and execute permissions. It is used to perform any kind of task on a system to create/update/access/delete other users’ accounts, install/remove/upgrade software packages, and so […]

4 mins read

How to tweak password expiry using Linux Chage command

Description The chage command, lets you tweak user password expiry information Following is its syntax: chage [options] LOGIN And here’s what the man page says about it: The chage command changes the number of days between password changes and the date of the last password change. This information is used by the system to determine […]

3 mins read

How to copy files between hosts in a network using DCP

Description We often need to copy or share files over the network. Many of us are used to using tools such as rsync or scp to transfer files between machines. In this tutorial, we are going to review another tool that can help you copy files between hosts in a network – Dat Copy (dcp). Dcp does not require SSH […]

2 mins read

How to Downgrade RHEL/CentOS to Previous Version

Description If you have upgraded your kernel and redhat-release packages and you are encountering some issues. In this article, we will describe how to do downgrade RHEL or CentOS version to previous minor version. Note: The following steps will only work for downgrades within the same major version (such as from RHEL/CentOS 7.6 to 7.5) but not between major […]

1 min read

How to Undo or Redo a Yum Install on CentOS and RHEL

Description One of the most important and useful feature added to YUM Package Manager (from version 3.2.25) is the ‘yum history’ command. It allows you to review a full history of yum transactions that have been run on a system. It shows the dates and times when a transactions were performed, whether the transactions succeeded […]