Author: Rahul

I, Rahul Kumar am the founder and chief editor of TecAdmin.net. I am a Red Hat Certified Engineer (RHCE) and working as an IT professional since 2009..

As more and more of our lives move online, it’s becoming increasingly important to protect our online privacy and security. One way to do this is through the use of SSH tunneling, a method of encrypting your internet traffic to keep it safe from prying eyes. In this beginner’s guide, we’ll explain what SSH tunneling is, how it works, and how you can set it up. What is SSH Tunneling? SSH (Secure Shell) is a network protocol that allows you to securely access and control a remote computer. SSH tunneling, also known as SSH port forwarding, is a technique that…

Read More

There are thousands of Linux distributions available that you can use. However, people can’t choose one perfect OS that they can use as an alternative to Windows 10 or 8. Now, when it comes to Windows, it’s pretty easy to use. The same isn’t applicable for Linux. Here, you will have to need basic knowledge to operate and use the operating system. Therefore, people often choose the Linux distribution that is easy to use for a Windows user. 10 Best Linux Server Distributions 10 Best Linux Desktop Distributions 5 Best Linux Distributions that Looks Like MacOS 5 Most Stable Linux…

Read More
Using SSH Config File SSH

Secure Shell (SSH) is one of the most commonly used and secured ways to connect to a remote server. It is easy to connect with a remote server with SSH but what if you want to connect with different servers and you do it frequently. It becomes difficult to remember all the IPs addresses, usernames, commands, and passwords. So to solve this problem, SSH allows you to set and use the ssh config file for different use-cases. SSH uses a system and custom or user-specific configuration file. You can customize and configure client-side connection options and can store information of…

Read More

While working with the databases, many times you may need to rename a database. For security purposes, MySQL had dropped the direct command to rename a database from MySQL 5.1.23. So there is no direct command to the T-SQL statement available for renaming a database in MySQL server. You can follow one of the below instructions to rename a MySQL database with the help of cPanel, phpMyAdmin, or command line as per the availability. After renaming the database, remember that you need to reconfigure the permission on the new database for the users. In this tutorial, you will find three…

Read More

When we talk about accessing servers remotely, the first thing that comes to our mind is SSH. It is a network protocol and a secured version of Telnet and encrypts the connection so others cannot access the information being transmitted. With advancements in the technology world, hackers are becoming more sophisticated every day. Even your SSH connection is not secure if you are using the traditional or default installation settings. Therefore, it has become necessary to secure your SSH server from unwanted data breaches and malicious attacks by taking some crucial precautions. In this article, we will introduce you to…

Read More

If you’re a web developer or a database administrator, you know how important it is to keep your MySQL user passwords secure. But, how do you quickly and easily change your MySQL user password when you need to? In this guide, we’ll show you how to easily change your MySQL user password in just a few steps. We’ll cover the basics of MySQL user passwords, how to reset your MySQL user password from the command line, how to change your MySQL user password using phpMyAdmin, and tips for creating a strong MySQL user password. Let’s get started! Changing MySQL User…

Read More

Roundcube is a web-based email client; an email client is a computer program that allows the user to read, write and manage their email. It runs on IMAP (Internet Message Access Protocol) which is a standard email protocol that allows the user to access email from anywhere, anytime. It stores emails on the server and enables the user to manage them as if they are stored on the user’s system. This helps the user in the organization and classification of different emails(This helps the user to organize and classify different emails into different folders). In this how-to guide, we will…

Read More

Remote Desktop Protocol (RDP) is a protocol developed by Microsoft, that allows a user to access remote systems graphically. The default Windows servers allow only one remote desktop session at a time. But, in some cases, we are required to enable remote desktops for multiple users to allow access at a time. You can achieve this by making little changes to the system registry keys. Once the changes are done, multiple users can connect to your system using the RDP client. You can also limit the number of users who can connect at a time. In this tutorial, we will…

Read More

Want to use Linux but want to feel like using Mac at the same time? You can surely try out these Linux distributions. These are the ultimate distributions you can go with that look just like Mac. With this, you will get the same feeling like you are using Mac. Along with the looks, we have also kept in mind the features and most importantly, your privacy. We know Mac users love privacy. Hence, our first pick is the best Linux OS for privacy. You can surely try out any of these OS. You will surely feel like you are…

Read More
Set Up Passwordless SSH SSH

Passwordless SSH login is a convenient and secure way to access your remote Linux servers without having to type in your password every time you log in. It involves setting up public-key authentication between the client and server, which eliminates the need for a password. In this article, we will walk you through the steps to set up passwordless SSH login on Linux. We will cover how to generate an SSH key pair, copy the public key to the remote server, and test the passwordless login. We will also provide troubleshooting tips to help you overcome common issues that may…

Read More