One of the problems with managing a fleet of Linux servers is that security updates and patches seem to be released in an almost continuous stream.
A VPN, or Virtual Private Network, is a commonly used method to create a secure network connection between computers. In most usage scenarios a client computer will connect to a server. Once connected, all or some of the network traffic from the client computer may be encrypted, and is sent to the server.
For those who haven’t been following this series and have started at part 3, in the first part of this series we looked at what database replication is and why it could be useful, as well as starting the configuration of our MySQL master server. In part 2, we prepared our master server for replication and backed up the databases we wished to replicate. Today we’ll be configuring the slave server to replicate the databases from the master.
When managing Linux servers, the Secure SHell (SSH) is the most commonly used tool for connecting to remote servers to do this.
Welcome to the second part of our look through the various file management commands for the Linux command line. In the previous article, we looked over changing our working directory, listing the contents of a directory and copying files or directories to somewhere else. In this part we’ll look over a few other commands.