In this article we will show how to change the default root password. As you know we provide VPS and dedicated servers with auto-generated passwords and we recommend to change it right after delivery to maximise the instance secure.Read More
ImageMagick is a free and open-source server side software to manage graphics (creating, editing images). It typically utilized from the command-line and available for wide list of platforms. We basically use MagickCore (C), MagickWand (C), MagickWand for PHP (PHP), IMagick (PHP), PythonMagick (Python). With a corresponding language interface setup we may use ImageMagick with easy.
FFMPEG is a leading solution to record, convert and stream audio and video files in Linux. We often use FFMPEG as a library in PHP or Python. In this step by step article we will know how to install and configure FFmpeg on CentOS 7 as it not as simple as ‘yum install *’.
Netwatch allows detailed traffic monitoring of your CentOS system. It shows the total speed at which data transfer is happening for each connection from local system to remote systems. To check the transfer speed from an interface, we can use the following command.
Monitoring of your CentOS installation is one of key tasks for every system administrator. They should know how to maintain their VPS systems, dedicated servers to avoid any issues. Below we will discuss top commands to monitor CentOS.
While working in CentOS 7 we feel ourselves comfortable with ‘nmtui’ – a killer tool which provides a text interface to configure networking by controlling NetworkManager (in GUI interface).
Graceful reboots and shutdowns are existing for soft closing of all write-to-disk operations. There are many OS critical write operations, for example MySQL. If you will apply hard reset you may get corruption databases in result. To avoid all these problems we recommend to use graceful reboot. The last thing every system administrator want to do is end up with corrupted data upon reboot and server databases malfunction.
You may request to provide for you RSA keys instead of passwords for dedicated servers and VPS instances, you ordered from us. This way of authorization is secure for most of operations and we basically recommend to use pair RSA keys.
We use maillogs when a mail problem just happened. In this case you can usually tail the log and see all the actions recorded in a file and investigate the errors. All logs are very important, but mail log is the top of them.
To see your Linux memory information and memory stats are very useful tools for investigation overload problems and server stability.