Atlantic.Net Blog

How to Create a Sudo User in Rocky Linux 8

In Linux or Unix-based operating system, there are two types of users: a superuser (root) and a normal or regular user. The root user has full control of the operating system and it has privileges to run administrative commands like installing, removing, and updating software packages, changing permissions, and configuring different services. The non-root users have limited interactions with an operating system environment and they can perform only user-specific tasks.

The sudo command, short for “super-user do,” is a Linux utility that allows a normal user to run any commands with unlimited privileges. In this case, you will need to add a normal user to the sudo group in order to execute administrative commands.

In this post, we will show you how to create a sudo user in Rocky Linux 8.

Read More


How To Set Up SSH Public and Private Key in Linux

SSH, also known as a “Secure Shell Protocol,” is a protocol used to access a remote Linux system securely over an unsecured network via the command-line interface. SSH allows users to run commands on remote Linux servers, install and remove software packages, and manage everything via command line from a single place.

If you are a Linux system administrator and managing multiple servers via SSH, then you may need to provide a root password each time when you connect to the remote server. Remembering passwords for thousands of servers is very difficult for an administrator. In this case, you can use an SSH public and private key pair to connect remote servers without entering a password.

In this post, we will show you how to create a public and private key and set up a Linux server for passwordless login.

Read More


How to Kill Running Processes in Linux

In Linux, an instance of a running service, application, or script is called a process. When you run any command, program, or application, a process is created for it. Each process has its own process id that is associated with a specific user and group. If any processes consume too many resources or become unresponsive, then you may need to kill them. In this case, you can use the kill command to stop the process without restarting your server.

In this post, we will show you how to kill running processes in Linux.

Read More


How to Find the Total Size of a Directory in Linux

Finding the size of the directory in Linux via the command line is very difficult for a beginner. du, also known as Disk Usage, is a Linux command-line utility that allows users to check the information on disk usage of files and directories on a system. The du command has many options that allow you to get the results in many formats.

In this post, we will show you how to find the size of a directory in Linux.

Read More


How to Install Latest Linux Kernel on Ubuntu 20.04

The kernel is the core and most essential component of Linux operating systems. It provides an interface between software applications and computer hardware. It is responsible for managing I/O disks, filesystems, CPU, and processes. The kernel is responsible for managing resources as efficiently as possible. The community of kernel Developers builds and deploys patches and updates to the Linux kernel to roll out security updates, bug fixes, and new functionality. If you are using a Linux operating system, it is a good idea to update the kernel to the latest version.

In this post, we will show you how to install the latest Linux kernel on Ubuntu 20.04.

Read More


How to Delete or Remove Databases in MySQL

If you are a database or Linux system administrator, then you may often need to delete unwanted databases from your system. There are several ways to delete a MySQL database in Linux. You can either use the MySQL command-line or phpMyAdmin to delete a MySQL database. You must have a MySQL user account with delete privileges to delete a MySQL database from your system.

In this tutorial, we will show you how to delete (or drop) a MySQL or MariaDB database in Linux.

Read More


How to Change Open File Limit in Linux

If you are a Linux user and work with many files at a time, then you may often face the error “Too many open files” on Linux. This is because you have reached the maximum open file limit set by Linux operating system. In this case, you can use the ulimit command to change the default limit set by the operating system.

The max open file limit is very useful to prevent your system from sudden crashes. There are two types of open file limits in Linux.

  • Hard Limit: This limit can only be modified by the root user.
  • Soft Limit: This limit can be modified by any normal user. It indicates the current value of the session or user.

In this post, we will show you how to change the open file limit on Linux.

Read More


How to Install MySQL 8.0 on Rocky Linux 8

MySQL is a free, open-source, and extremely popular relational database management system. It is a simple, fast and scalable SQL-based database system that can be installed as part of a LAMP or LEMP stack. Due to its speed and efficiency, it is the best choice for e-commerce and data warehousing applications. MySQL is readily available for all Linux distributions as well as other operating systems.

In this post, we will explain how to install MySQL 8 on Rocky Linux 8.

Read More


How to Check Open Port on a Remote Linux System

A Port is a logical number assigned to a process running on Linux. Port can be defined as an integer number between 0 to 65535. Ports with numbers 0–1023 are called system or well-known ports, while ports with numbers 49152-65535 are called dynamic, private, or ephemeral ports. If you are a Linux system administrator then you should have the knowledge to find out which ports are open and running on a remote system. There are several ways to find an open port on Linux.

In this post, we will show the most reliable ways to find an open port on a remote Linux system.

Read More


Top 10 Best HIPAA Compliant VOIP Providers

Securing digital communications is an essential requirement of the Privacy and Security Rule amendments of HIPAA legislation. All communications must uphold data integrity and safeguard patient confidentiality.

Voice Over Internet Protocol (VoIP) is a digital data phone system that commonly integrates with email and text-based services, and for healthcare organizations and covered entities, VoIP likely must be HIPAA-compliant.

Read More


New York, NY

100 Delawanna Ave, Suite 1

Clifton, NJ 07014

United States

San Francisco, CA

2820 Northwestern Pkwy,

Santa Clara, CA 95051

United States

Dallas, TX

2008 Lookout Dr,

Dallas, Texas 75044

United States

Ashburn, VA

1807 Michael Faraday Ct,

Reston, VA 20190

United States

Orlando, FL

440 W Kennedy Blvd, Suite 3

Orlando, FL 32810

United States

Toronto, Canada

20 Pullman Ct, Scarborough,

Ontario M1X 1E4

Canada

London, UK

14 Liverpool Road, Slough,

Berkshire SL1 4QZ

United Kingdom

Resources