389 Directory Server is a super fast open source enterprise LDAP Server.
In this tutorial, we’ll explain how to install and configure the LDAP client on Linux which will talk to your 389 directory server.
[continue reading…]
389 Directory Server is a super fast open source enterprise LDAP Server.
In this tutorial, we’ll explain how to install and configure the LDAP client on Linux which will talk to your 389 directory server.
[continue reading…]
In MySQL or MariaDB, anytime you make a change to the database, that particular event is logged.
For example, when you create a new table, or update data on an existing table, those events are stored in the binary logs.
Binary log is very helpful in MySQL replication, where the main server will send the data from the binary logs to the remote servers.
You’ll also be dealing with binary log files when you are performing any kind of recovery operations in MySQL.
mysqlbinlog command is used to view the content of the binary log in a readable user friendly format. You’ll also use the mysqlbinlog command to read the content and pipe it to other mysql utilities.
[continue reading…]
One of the important feature in Chromebook is that you don’t need to manually update the Chrome OS.
Chrome OS updates the OS in the background on an ongoing basis. This way, you’ll always be running the latest version of the Chrome OS.
But, there may few situations where you may want to view the current version of the Chrome OS, and if it is old, forcefully update Chrome OS to the latest version.
[continue reading…]
Ability to change (rewrite) incoming URL into a different URL based on your criteria is an essential feature for any webserver.
Nginx rewrite is very powerful and flexible.
In this tutorial, we’ll explain the following examples on nginx rewrite:
389 Directory Server is an open source enterprise LDAP Server.
This can handle very huge volume of data. One of the huge benefit of 389 LDAP server is that it is lighting fast and process upto handle several thousands of operations per second.
This has several advanced features including asynchronous multi-master replication for horizontal scaling, which in-turn provides provides 100% fault tolerance and extremely high throughput.
Also, keep in mind that this supports TLS, SASL for authentication and transport. 389 Directory server is fully LDAPv3 compliant.
This tutorial explains how you can install and configure 389 directory server on your Linux environment.
[continue reading…]
In Amazon AWS, all the activities that you perform to manipulate your EC2 instances from AWS Console web interface can also be performed from command line using aws cli utilities.
The command is aws. You can use the ec2 option in the aws command to manipulate your ec2 instances.
This tutorial specifically covers about UserData in EC2. We’ve shown the CLI examples for the following:
In SELinux, one of the frequent task that you may do is to change the security context of an object. For this, you’ll use chcon command.
chcon stands for Change Context.
This command is used to change the SELinux security context of a file.
This tutorial explains the following chcon command examples:
In C++, the most common type of inheritance is public.
The public type of inheritance is used in order to broaden the parent class with some functionalities or some data members.
This type of public inheritance is sometimes called the ” is “, as the parent class and the child class are of the same type and that could be seen with conversions, where the child class has more to it, than parent one.
The private inheritance is of different type, it is of ” has ” type.
This means that private inheritance is suitable for situations in which we need to prevent main program to accidentally access some of the methods inherited from the parent class.
The protected inheritance is less restrictive than private and it is useful when we need some of the implementations from grand parent class.
[continue reading…]