While choosing web hosting service provider for your future or already existing web site you will be confronted with the main dilemma- type of the web server platform that you will use for hosting your web site.
It is significant, that the choice of web hosting platform should be based not on the commonly known facts related debates about what hosting platform is better, but on real requirements of your web site. And all the more, the operating system installed on your home computer shall not determine your choice of web hosting platform, as if you have Windows on your machine you can use Linux (Unix) web hosting services.
Your Linux server is the back bone of any hosting service or solution you do offer in any manner to your clients. The complexity and credibility of the servers make it very prone to the visible and virtual security threats against data and information. Web hosting service providers now start visualizing server security as a very comprehensive process. Interestingly, the process of securing the web servers is comparatively tedious than breaching it. The key motive behind the Linux server security is to create a protection wall against a wide variety of threats prevalent in the area of server functioning. Among several security measures, below illustrated are some of the key aspects of server security to be implemented.
SSH Level Security: The OpenSSH package is installed on the many of the Linux servers by default. This default installation is primarily offers best of the server functionalities and shows lesser concerns to the security lapses. SSH allows many utilities that could be the primary reasons of security holes. Allowing root logins and listening to port 22 may be the topmost causes of security breach. Experts at a web hosting company usually perform several activities to strengthen this area: Continue reading
‘Undelete’ is an option to recover and restore the lost or deleted files form the computer by rewinding the operation. Without the in-built undelete feature, the retrieval of lost or deleted files is termed as data recovery and in Linux operating system based computers, it is popularly known as Linux data recovery.
There are many file systems, which have the built-in undelete feature to reverse an accidental-delete operation of important data. However, this feature is not available with every file system. Moreover, though the undelete feature is very much useful for the ones who have deleted some important
files/folders and at the very next moment, realize that the data was extremely important to be recovered back, the feature also alarms for a security risk.
Many operating systems with graphical user interface has a concept of ‘holding area’. If a file or folder has been deleted, then the information regarding these files move to the ‘holding area’ and are periodically deleted. In case of Windows and Macintosh operating systems, similar concept exists in the form of ‘Trash’. Though some of the recent Linux versions also have the undelete feature, still most of the command based operating systems, such as DOS, Linux and UNIX does not support undelete and leave the recovery of data upto recovery utilities, such as Linux recovery.
Some Linux file systems like ext2 has an in-built recovery feature called ‘e2undel’ which can undelete many recently deleted data from the ext2 file system based Linux computers. Similarly, in case of ext3 file system in Linux, though the ‘ext3grep’ utility has been designed to automate the undelete kind of operation, officially, ext3 does not support undelete. Apart from these two file systems, all the others file systems in Linux, such as ext4, reiserFS etc. does not have any undelete feature. Continue reading
As grasp in the Java Developers community, Java is a platform independent object oriented language which runs on each platform. That is why it’s very said for Java that “Compile once, run anywhere” language.
The Linux su command gets its name from the word superuser. The su command is run in a Linux terminal emulation window to log during and work because the root user, following logging in to a Linux desktop because a “regular” (non-root) user. Never log during to a Linux desktop as the root user.
LUGs give training and technical support and is going to help fresh users with operating system installations. They are also also pivotal in establishing the internet communities that incorporate widespread chatrooms and newsgroup usage. In addition there are also a number of specialist the internet and traditional print publications devoted entirely to Linux secrets, allowing users to keep up to date with every one the newes developments.
Two recent Linux news items are price noting. First, the mobile phone industry is strongly embracing Linux. When we determine Motorola, NEC, Panasonic, Samsung Electronics, NTT DoCoMo and Vodafone band together to standardize Linux for handies, we know the Linux pathogen has reached a crossroads from where it is able to infect the population at wide. Continue reading