The ionice command is used to set I/O scheduling class and priority for a program. The I/O schedule for a program can be changed to the following: CFQ Noop scheduler Anticipatory Deadline The current Disk Scheduler can be viewed from root@twenty ~]# cat /sys/block/sd[ab]/queue/schedulernoop anticipatory deadline [cfq] The current scheduler can be changed by [root@twenty queue]# echo anticipatory > scheduler[root@twenty queue]# cat /sys/block/sda/queue/schedulernoop [anticipatory] deadline cfq Ionice Utility The ionice sets the io scheduling class and priority for a program or script. It supports the following three scheduling classes Idle: …
SupportPRO joins CloudFest 2023: World’s largest Cloud Industry Conference
Greetings everyone, I am excited to announce that SupportPRO will be attending CloudFest 2023, the world’s largest cloud-computing conference, taking place from March 20 to 23, 2023, at Europa Park, Germany. Since our inception, we have been part of every iteration of CloudFest, and this year will be our best one yet. As the CEO and Founder of SupportPRO, I am eager to connect with you and discuss how our team can assist you in optimizing your internet infrastructure to meet your business needs. At SupportPRO, we specialize in remote …
Data recovery is the process of salvaging and handling the data through the data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. The data is recoverable because the information is not immediately removed from the disk. Nowadays many tools are available for recovering lost data. Two of the most popular tool available are Scalpel and Foremost. In this article, let’s see how to recover lost data using these tools. 1. Scalpel Scalpel is an open source file system recovery for Linux and Mac …
A fork bomb is a type of denial-of-service attack that can be executed on a computer system. It is a malicious program or script that creates a large number of processes, overwhelming the system and causing it to slow down or crash. The fork bomb works by creating a large number of child processes, which in turn create more child processes, leading to an exponential growth in the number of processes. The code for a fork bomb is often written in bash and executed in the command line. Once activated, …
If you’re having issues with outgoing mail service in Linux-Qmail server, where all outgoing emails or emails to any specific domain are getting stuck in the remote queue, don’t worry. In this article, we provide a step-by-step solution to resolve the issue. The article details the issue and error message, as well as provides a resolution that includes checking the Qmail-SMTP routing, verifying connectivity to the host mentioned as a relay, and restarting the Qmail service. We also provide guidance on checking the mail log and Qmail queue to ensure …
Outsourced tech support is when you hire an external company to handle your business’s technical support. It is becoming increasingly popular among small to medium businesses as an affordable solution for their IT support needs. The benefits of outsourced tech support include reduced costs compared to hiring an in-house team, flexibility in scaling up or down as required, the opportunity to focus more on your business’s core functions, and access to up-to-date server technology and practices. Outsourcing Tech Support: Advantages As mentioned, the most significant advantage of outsourced tech support …
Cloud Hosting, Cloud Computing, & Cloud Architecture are the latest and fast rising technologies. Many explanations to the term Cloud and many get confused between the terms Grid Computing and Cloud Computing. Cloud Hosting systems are becoming more and more popular, because of web hosts and IoT, basically Shared Hosting providers have to deal with a lot of websites and applications like Instagram, Facebook etc. which require growing amount of resources. Cloud computing made a disruptive movement in the computing industry, by providing computing as a service, not as a …
Clearing cache memory in Linux is a common task that is often necessary to improve system performance or to troubleshoot issues. One way to clear cache memory without having to reboot the system is by using the sysctl command. The sysctl command can be used to configure kernel parameters at runtime, which allows for various system settings to be adjusted without having to reboot the system. To clear the cache memory in Linux, you can use the following command: root@twenty ~]# sync && sudo sysctl -w vm.drop_caches=3 && sudo sysctl …
The WHM/cPanel can be accessed without knowing the actual password if it satisfies a single condition i.e you must have shell access to the server. If you have the shell access through SSH Keypair or using VPS nodes on the server, you can simply access the WHM panel without knowing the actual root password of the server. The steps to create a session to access the WHM panel for the root or any reseller accounts without a password is detailed below. whmapi1 is the command which could be executed via …
TightVNC is a remote desktop software application and it can be used to connect to another computer and display its live remote desktop. Like other VNC systems, it consists of two parts: the “Server”, which shares the screen of the machine it’s running on, and the “Viewer”, which shows the remote screen received from the server. TightVNC Server is designed to run in two modes: Application mode & Service mode In application mode, the server, just like any other desktop software, can be running only during the current user session …