How do you install Virtualmin on Redhat or CentOS? Core

Virtualmin is a web hosting control panel for Linux and BSD systems that is both powerful and adaptable. Virtualmin is the cost-effective and complete solution to virtual web hosting administration, available in an Open Source community-supported version as well as a more feature-rich version with premium support. To install the control panel, we must first... Continue Reading Continue Reading

How to resolve CentOS 8 / RHEL 8's ifconfig command not being found? Core

ifconfig is a command-line utility that displays network interfaces associated to Linux Servers as well as network information like IP addresses, netmask, and so on and network interfaces have been assigned to them. It also shows the number of transmitted and received network packets, as well as the number of error and dropped packets. When... Continue Reading Continue Reading

How to Count Number of Files and Subdirectories inside the directory in Linux command line? Core

The simplest way to count number of files & subdirectories in a parent directory using a “tree” command. $ tree -iLf 1 $ tree -iLf 1 /var/log You can use the tree man page for more useful options, configuration files and environment variables to use. At Velan, our server support engineers can help you with... Continue Reading Continue Reading

How to Install PHP 8.X on Debian 10 Linux

How to Install PHP 8.X on Debian10? Here are the 4 simple steps to install latest php 8.X version on debian& Ubuntu flavored Linux servers. Step 1 – Setup Apt Repository $ sudo apt update $ sudo apt install -y gnupg2 ca-certificates apt-transport-https software-properties-common $ sudowget -qO – | sudo apt-key add – $... Continue Reading Continue Reading

How to fix vulnerabilities in sudo package? Linux

Qualys provide cloud security, compliance and related services research team has disconvered the overflow vulnerability in sudo. This vulnerability has been hiding for nearly 10 years. Te bug allows any local users to gain root access without authentication (no user’s password required. The two vulnerabilities identified are A local attacker could possibly use this issue... Continue Reading Continue Reading


Quick Connect With Us