Skip to main content

Latest feeds

How to remove Siri from my MacBook

How to remove Siri from my MacBook

Siri is very nice and all, but when I decided to uninstall it I found out that as opposed to any other app I can easily install / Uninstall from my Macbook, Removing Siri can be a headache.

Never the less, This is how to remove Siri from your macbook in 5 simple steps

How to add a ploop disk to an existing O...

How to add a ploop disk to an existing OpenVZ container

Following my guide Open Virtuozzo [OpenVZ] installation manual for CentOS/RHEL, In this guide, I will teach you How to add a ploop device to an existing OpenVZ container. Table of Contents Requirements:Let’s Begin:Find the relevant space neededCheck that the logical volume has been created successfully by running lvdisplay like so:Format it with ext4:Create a local […]

Open Virtuozzo [OpenVZ] installation man...

Open Virtuozzo [OpenVZ] installation manual for CentOS/RHEL

What is OpenVZ?

OpenVZ (Open Virtuozzo) is an operating system-level virtualization technology based on the Linux kernel and operating system.
OpenVZ allows a physical server to run multiple isolated operating system instances, called containers, virtual private servers (VPSs),
or virtual environments (VEs).
OpenVZ is similar to FreeBSD jails and Solaris Containers.

NRPE Installation and Configuration on C...

NRPE Installation and Configuration on CentOS/RHEL

Requirements: A Linux machine connected to the internet. Optional Requirement: A Linux machine running Nagios server (needed for running checks) What is NRPE? NRPE stands for Nagios Remote Plugin Executor. It’s a Nagios agent that allows remote system monitoring using scripts that are hosted on the remote systems. It allows for monitoring of resources such […]

The Heartbleed Bug end user to do list

Recently, a serious vulnerability has been discovered in the very popular OpenSSL cryptographic software library known as the heartbleed bug. This weakness allows a malicious user to steal information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic […]