Reference page: https://www.ssh.com/academy/ssh/authorized-keys-openssh OpenSSH daemon config file location: /etc/ssh/sshd_config – customized authorized_keys path can be set inside the config file 1. In the authorized_keys file for SSH, you can use /bin/false to ensure that a specific […]
iptables-services on CentOS is a package that provides the traditional iptables service to manage IPv4 firewall rules. This service allows you to configure and manage firewall rules using the iptables tool, which is a user-space utility […]
awk is a versatile command in Unix/Linux for text processing, data extraction, and reporting. Below are the takeaways from geeksforgeeks documentation:Reference: https://www.geeksforgeeks.org/awk-command-unixlinux-examples/ Syntax: awk options ‘selection _criteria {action }’ input-file > output-file Built-in variables NR Variable […]
1. CPU and Memory Usage 2. Disk Usage 3. Network 4. Process Monitoring 5. System Activity Reporter (sar) 6. Performance Analysis 7. Monitoring Files and Directories
Navigation Editing Copy-Paste Undo/Redo Search and Replace Miscellaneous Reference: https://vim.rtorr.com/