How to Change Time Zone in Ubuntu?

An application server provides various services in a public or private network. Therefore, this server must be properly configured to do this efficiently. System configurations range from complex and technical tasks such as resource management…

How to Change Time Zone in CentOS?

How to Change Time Zone in CentOS? While setting up a new server, you may often have to set the time zone. In certain cases, you may want to change your time zone. Setting the…

How To Secure Your Mikrotik Server

When it comes to network security, routers are among the most important components that need protection and sensitivity. Mikrotik routers, which have become one of the must-haves of organizational networks due to their power and…

What is Lubuntu OS?

If you are a fan of the Linux operating system and you use a system with relatively weak hardware and limited resources such as low RAM and hard disk space, the Lubuntu operating system is…

How to Install Open VM Tools on Debian 11

After installing Linux or Windows on the virtual machine provided by VMware Workstation, we need to launch the VMware tool. This is because, by default, the virtual machine is not optimized to work in parallel…

Mikrotik Bandwidth Test Tool and How to Use It

When it comes to bandwidth speed test, speed test is the first tool that comes to our mind, but this tool can be used to test the speed of Windows, Linux or mobile devices, and…

Basic Command Codes and Linux Commands in cPanel

Accessing and working with its control panel is very important for hosting management, so in this article, we decided to talk about the main command codes and Linux commands in cPanel. Logging in to cPanel…

File Permissions in Linux with Examples in 2023

File access permissions are crucial in ensuring the security and health of Linux operating systems. Those using Linux must be familiar with setting, changing, and managing file access permissions. For this reason, we decided to…

How to Block Port Scanner in MikroTik

How to Block the scanner port and prevent it in Mikrotik Open network ports are golden opportunities to launch hacker attacks. If you don’t do the necessary things to protect your Mikrotik router and network,…

How to Use Port Knocking To Secure SSH Service (Debian/Ubuntu)

At the beginning of reading the article, you may have a question about what SSH is and what its uses are. So, we will start with a brief explanation of the concept of SSH and…