Basic Linux commands

In this article we will be discussing a few basic commands we could use in our daily server terminal interaction.

Generally Linux commands have the following syntax.

command [options] [arguments]

Each item is separated by space.

>> Options modify a commands behavior.

  • Single letter options usually preceded by “ – ”
  • Full word options usually preceded by “ — ”

>> Arguments are file names or other data needed by the command.

>> Multiple commands can be separated by “;”
Lets have a check with few of the most commonly used commands below: Continue reading…

Top Server Administration Tools

Today many tools are available for performing Server Administration. In this article, lets have a check with few of the top Server Administration tools.


TightVNC is a remote desktop software application and it can be used to connect to another computer and display its live remote desktop. Like other VNC systems, it consists of two parts: the “Server”, which shares the screen of the machine it’s running on, and the “Viewer”, which shows the remote screen received from the server

TightVNC Server is designed to run in two modes:
>> Application mode
>> Service mode

In application mode, the server, just like any other desktop software, can be running only during the current user session and quits on the logout. Each user has his/her personal settings and passwords. Continue reading…

IP Spoofing

IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system. Its a phenomena in which attackers changes or replicate a IP packets. In order to dig deep lets understand some basic concepts.

In internet the connection between two computer takes place using TCP/IP protocol. In which data needed to send from one computer to another is broken down into pieces known as packets. These packets are numbered when broken down so that they can reassembled at the end or receiver. Each packets have two parts header and body. Body stores the message part and Header stores the metadata for the packets such as source IP, destination IP, sequence number, TLL etc. These metadatas are used in the destination for the authentication of the connection or to identify the source of the request. These data can be generated or modified by a third person or attackers this is commonly known as IP Spoofing. Continue reading…

Creating or Removing Scheduled Tasks (cron) in Plesk (windows)

Some scripts/applications require certain scripts be run at a certain time to function properly.

On Windows servers, we can set them up to run at certain times by creating a schedule task (which is similar to how you can run cron jobs on Linux servers).

Creating a Scheduled Task in Plesk:

We can set up Scheduled Tasks in Plesk by doing the following:

  • Log into Plesk

The user you are logging in with should have enough permissions to create a scheduled task. Windows Shared customers automatically have permission, and the Admin user for Windows Dedicated Servers automatically have permission. Additional users created by the Admin on a Windows Dedicated Server may or may not have permission to setup scheduled tasks, depending on what permissions you give them. Continue reading…