Create a MySQL Database, Username, Password, and Privileges from the command line Step 1: Login to MySQL ( you will need an account ) user@server:~$ mysql -u mysql_user -p Enter password: Step 2: Create the Database mysql > create database db_name; Step 3: Verify that it’s there mysql > show databases; Step 4: Create the User mysql > create user db_user; Step 5: Grant privileges while assigning the password mysql > […]

Recover deleted files and folders using scalpel (A Filesystem Recovery Tool) on linux pel based on Foremost an open source application developed to recover deleted information, Scalpel is significantly more Fast and efficient by reading database of header and footer definitions and extracts matching files or data fragments from a set of image files or raw device files. Scalpel is file-system-independent and can recover files from FATx, NTFS, ext2/3/4, HFS+, or raw partitions. It is useful for […]

What are useful CLI tools for Linux system admins System administrators (sysadmins) are responsible for day-to-day operations of production systems and services. One of the critical roles of sysadmins is to ensure that operational services are available round the clock. For that, they have to carefully plan backup policies, disaster management strategies, scheduled maintenance, security audits, etc. Like every other discipline, sysadmins have […]

Limiting Access with SFTP Jails on Debian and Ubuntu As the system administrator for your Linode, you may want to give your users the ability to securely upload files to your server. The most common way to do this is to allow file transfers via SFTP, which uses SSH to provide encryption. This means you need to give your users SSH logins. But, […]

Linux Commands Line A – Z

Link Linux Commands Line A – Z A     Command Description # alias hh=’history’ set an alias for a command – hh = history # apropos …keyword display a list of commands that pertain to keywords of a program , useful when you know what your program does, but you don’t know the name of the […]

Adding a self-signed certificate to the “trusted list” on linux

Link he simple answer to this is that pretty much each application will handle it differently. Also OpenSSL and GNUTLS (the most widely used certificate processing libraries used to handle signed certificates) behave differently in their treatment of certs which also complicates the issue. Also operating systems utilize different mechanisms to utilize “root CA” used […]

Adding a corporate (or self-signed) certificate authority to git.exe’s store

Link This is a topic that I touched on a little bit in my last post, “Git network operations in Visual Studio 2013.” If your organization has an on-premises installation of Team Foundation Server 2013 or later, and you connect using HTTPS, then the root certificate which vouches for the authenticity of your SSL cert […]