Author: Rahul

I, Rahul Kumar am the founder and chief editor of TecAdmin.net. I am a Red Hat Certified Engineer (RHCE) and working as an IT professional since 2009..

Do you ever have a situation where you need to replace a word or sentence in many files? You could copy and paste it, or perhaps there’s an existing script that can do the job. But how about if you just need to replace it with another word or sentence somewhere else? You could use find, but that would be too generic and require writing a script for this task. And what if you don’t even know what word or sentence you must find and replace? How about using sed then? If you are not familiar with the Unix command…

Read More

phpPgAdmin is web-based client written in php for accessing and managing PostgreSQL databases. It provides very efficient way to work with databases on PostgreSQL like, create database, table, alter database, export/import database etc. This article will help you to install phpPgAdmin on CentOS and RedHat Systems. Before installing it make sure you have Apache and PostgreSQL installed on server. If you do not have them read our tutorials to how to install them. Installing PostgreSQL on CentOS, RHEL and Fedora Installing Apache MySQL PHP on CentOS and RHEL Step 1: Add PostgreSQL Repository First step is to install postgres repository…

Read More

Sudo is used for providing access to root (Super admin) commands to non-root users. For example, As an administrator, you want to provide access to restart the webserver to user nick, but he cannot make any changes to its configuration. You can provide sudo access to user nick to do it. To edit sudo configuration file use: visudo The above command will open /etc/sudoers file in an editor. This file is the main configuration file for sudo settings. In the sudoers file, you will get an entry like below. This provides privileges to root user to do anything. root ALL=(ALL)…

Read More

The Red Hat Package Manager (RPM) is an essential tool for managing software on RPM-based Linux distributions such as Red Hat Enterprise Linux (RHEL), CentOS, Fedora, and SUSE. It simplifies the process of installing, upgrading, verifying, querying, and removing software packages. In this comprehensive guide, we will delve into the RPM command, exploring its capabilities through practical examples to help you master package management on your Linux system. Introduction to RPM RPM packages are digital containers for software, comprising the software itself along with metadata about the package like its version, dependencies, and a description. The RPM command facilitates interaction…

Read More

I had created this rpm few months back. Now it is available for all users. This rpm have a simple shell script for mysql database backup. Features: Takes database backup locally. Upload backups to ftp server. Send email alerts on backup completed. Installation: Download this rpm directly using command line or using given below download link and install it. [wpdm_file id=4] # wget https://tecadmin.net/wp-content/downloads/rpms/mydumpadmin-1-0.noarch.rpm # rpm -ivh mydumpadmin-1-0.noarch.rpm Preparing… ########################################### [100%] 1:mydumpadmin ########################################### [100%] Thank you for installing this RPM. Configure backup settings in /etc/mydumpadmin/settings.conf file Setup /etc/mydumpadmin/mysql-dump.sh script in your cron to take backup automatically 0 2 * *…

Read More

GPG basic file encryption doesn’t required public/private key. But to make a encrypted file more secure you can use RSA/DSA algorithms. These algorithms generates public and private keys to encrypt file. This article will help you to do following three tasks for File Encryption using GPG Key Pair in Linux. Create key pair Encrypt/Decrypt file locally for same user account. Encrypt file for other user. Decrypt other users file. Step 1: Create GPG Key Pair The very first step is to generate key pair. Use the following command to generate gpg key pair. # gpg –gen-key Output: gpg (GnuPG) 1.4.5;…

Read More

The tar command is an essential tool for Linux users, especially for those who work with a large number of files. The tar command allows you to combine multiple files into a single archive file and also to extract files from an archive. In this article, we will provide a comprehensive guide for beginners on the basics of tar command in Linux. What is tar Command? The tar command is short for “Tape ARchive”, which is a popular file archiving utility in Linux. Tar is used to create archive files by combining multiple files and directories into a single file.…

Read More

The zip command in Linux is a utility used for packaging a group of files into a zip archive. The zip command can also be used to compress files, making them take up less space on your computer’s hard drive. In addition, the zip command can be used to encrypt files, making it more difficult for unauthorized users to access the contents of the zip archive. To unzip a zip archive, you can use the unzip command. This command will decompress the files in the zip archive, allowing you to access them. Zip Command Examples Go through the below real…

Read More

AS we know, now a days it’s not safe to send and receive data over internet. There are many option available to secure your data while traveling over internet. GnuPG also provides you to encrypt your data on key basis and transfer them securely over internet. GPG is an encryption and signing tool for UNIX/LINUX like OS. GnuPG provides many methods for file encryption and decryption. click here to read more about GnuPG. This article will help you about File Encryption using GPG key on linux system. Step 1: Create Test File Firstly create a test file to encrypt. you…

Read More

RNDC controls the operation of a name server. rndc uses tcp connection to communicate with bind server for sending commands authenticated with digital signatures. Configure RNDC Key for Bind9 using below steps. Step 1: Create RNDC Key and Configuration File First step is to create rndc key file and configuration file. rndc provides command line tool rndc-confgen to generate it. # rndc-confgen Sample Output: # Start of rndc.conf key “rndc-key” { algorithm hmac-md5; secret “DTngw5O8I5Axx631GjQ9pA==”; }; options { default-key “rndc-key”; default-server 127.0.0.1; default-port 953; }; # End of rndc.conf # Use with the following in named.conf, adjusting the allow list…

Read More