This How-To will guide your through successfully recovering (resetting) the root password on most Linux based systems.
This How-To will walk you through setting up public key authentication over SSH. Using key-based authentication instead of passwords means you don't have to give away system passwords. There are several benefits for doing this. For example, it can be used to automate authentication, or to enhance security by requiring a user-generated key in addition to a passphrase. Key-based authentication also simplifies the distribution and management of login credentials across several remote systems.
Have you ever wanted to extract or view the contents of an ISO file without burning it to CD/DVD media? This Linux How-To will walk you though mounting the ISO file directly under Linux.
In this How-To we're going to walk you though changing the default SSH port on a Linux system.
Text editors are programs used to create or edit files. One of the most popular editors on Linux/Unix systems (also available for other platforms) is vi. Though it does take some time getting use to, this easy to follow HowTo will walk you through the essentials of using vi.
Anyone that has used a Windows Operating System should be familiar with Task Manager, the program that allows you to end processes and to view a dynamic display of your computer's performance. For those making the switch over to Linux here are the alternatives to Task Manager.
Have you ever had a stray process eating up all your system resources or just wanted to terminate a program? This HowTo will guide you through the steps of killing any process on your Linux system.
So you've managed to misplace your root login for a MySQL database? Not to worry, the following procedure will guide you though resetting the root password on a MySQL database in 7 easy steps.