Skip to content
Technology Ramblings
  • Home
  • Privacy Policy
  • Home Lab
  • About
  • Toggle website search
Menu Close
  • Home
  • Privacy Policy
  • Home Lab
  • About
  • Toggle website search
  • Home
  • Privacy Policy
  • Home Lab
  • About
Read more about the article Linux: Enhancing System Security with AIDE (Advanced Intrusion Detection Environment)

Linux: Enhancing System Security with AIDE (Advanced Intrusion Detection Environment)

  • Post author:admin
  • Post published:November 10, 2023
  • Post category:RedHat

In the ever-evolving landscape of cybersecurity, maintaining the integrity and security of your system is of paramount importance. One of the key tools that can help you achieve this is…

Continue ReadingLinux: Enhancing System Security with AIDE (Advanced Intrusion Detection Environment)
Read more about the article Implementing Transport Layer Security (TLS) for MongoDB Replica Set

Implementing Transport Layer Security (TLS) for MongoDB Replica Set

  • Post author:admin
  • Post published:June 8, 2023
  • Post category:RedHat

This guide will provide step-by-step instructions on setting up TLS (Transport Layer Security) for a MongoDB replica set. By following the provided information and configuration file, you can establish secure…

Continue ReadingImplementing Transport Layer Security (TLS) for MongoDB Replica Set

Linux : Notes on usermod command with 10 examples

  • Post author:admin
  • Post published:August 25, 2022
  • Post category:IT/RedHat

usermod is a command-line tool for modifying a user's login details.It is used to change the information of an existing user account, such as the username, user ID, home directory…

Continue ReadingLinux : Notes on usermod command with 10 examples

Linux: Volume Management

  • Post author:Chatur Tamang
  • Post published:January 20, 2020
  • Post category:RedHat

I've run into issues where the drive runs out of space and have to add a new one and move the data. Most of the time it scares me. I…

Continue ReadingLinux: Volume Management

Red Hat: Adding unused disk space to the existing volume group

  • Post author:admin
  • Post published:November 9, 2018
  • Post category:IT/RedHat

If you have some unused disk space and want to add to the volume group.No data will be lost on existing volume. root@localhost ~]# df -h Filesystem Size Used Avail…

Continue ReadingRed Hat: Adding unused disk space to the existing volume group

Install CA certificate for application in Red Hat

  • Post author:admin
  • Post published:April 16, 2018
  • Post category:IT/RedHat

 Create a directory under an app/site  in Red Hat server /path/cert Download a root CA certificate and copy to the above folder. Check the certificate expiration openssl x509 -text -noout…

Continue ReadingInstall CA certificate for application in Red Hat

ABOUT

I am a goal-oriented Infrastructure System Engineer and Information System Security Officer with over 10 years’ of experience in planning and implementation of network, servers, virtualization and security technologies . Background includes hands-on experience with multi-platform, LAN/WAN environments, assessing and implementation of security controls in using ODAA and RMF guidance. Demonstrated record of success in migrating, troubleshooting Servers and increasing efficiency.

Recent Posts

  • Home Lab Upgrade: VMware vSphere and vCenter from 7.x to 8.x – Issues & Challenges
  • Configuring a Secure LDAPS Identity Source in vCenter with Root and Issuing CAs
  • Seamless SharePoint Access: Enabling Integrated Windows Authentication in Browsers
  • MongoDB is unable to unlink (remove) its socket file. Cannot restart MongoDB service.
  • Unable to start MongoDB service after an upgrade
Copyright - WordPress Theme by OceanWP