Skip to content
Thursday, June 26, 2025
Latest:
  • Demystifying SLAs, SLOs, and SLIs: A Guide to Service Reliability
  • The complete flow of scheduling a POD in Kubernetes – short note
  • Fetch Kubernetes node details for quick analysis of your worker nodes
  • What is a Linux container?
  • Advantages of Prometheus monitoring tool

Crybit.com

The Linux Expert!!

  • Home
  • About
  • Web Hosting
    • cPanel
    • Direct Admin
    • kloxo
    • Plesk
    • webmin
    • commands
    • Firewall
    • exim
    • MySql
    • Utilities
  • DevOps Tips!
    • k8s
    • Docker
    • Prometheus
    • AWS
    • Puppet
    • Ansible
    • Python
  • SEO
  • LinkedIn

Security

Security Uncategorized

Manage passwords using LastPass – Live safely

October 28, 2018October 30, 2018 AnnLeave a reply

LastPass? Are there any advantages in LastPass over traditional “remember password” option in my browser? Yup, that’s the question! Why we need to use the password manager like LastPass. Definitely, it has a lot of advantages over the remember password option…

Security

Server Is Compromised: What Do I Do?

September 21, 2017July 18, 2018 Arunlal ALeave a reply

Server Is Compromised: What Do I Do? As a systems administrator, it’s your job to keep tabs on your server. To address the first point, keeping up with antivirus definitions updates and making sure you have the latest service packs…

Security

What you can do? See what experts say about Wanna cry!

May 16, 2017June 10, 2017 Arunlal A1 Comment

Why this post? I am a Linux tech, however, I also have some responsibilities to share some precautions for Windows users to stay away from Wanna Cry attack. As it’s causing bulk issues in IT resource. Almost all countries are…

Security

How to remove your IP address from Gmail blacklist?

November 6, 2016November 6, 2016 Arunlal A6 Comments

Are you frustrated with sending emails to Gmail account? A lot of bounced back messages? Here we go with a solution for this problem. Yeah, It’s totally a frustrating one, getting a lot of bounced back emails instead of its normal…

Security

Know more about dirty cow vulnerability – CVE-2016-5195

October 25, 2016November 2, 2016 Arunlal A1 Comment

How to clean a dirty Cow? Lol!! We all are already aware about the recently detected vulnerability which affects the Linux kernel memory sub system. This vulnerability is assigned to CVE-2016-5195. Since the feature that is affected by this bug…

Security

ImageMagick Security Issue – CVE-2016-3714 – Fix

May 5, 2016May 5, 2016 Arunlal ALeave a reply

In short, ImageMagick is a software suite to create, edit, compose, or convert bitmap images. It can read and write images in a variety of formats (over 100) including DPX, EXR, GIF, JPEG, JPEG-2000, PDF, PNG, Postscript, SVG, and TIFF.…

Latest topics

  • Demystifying SLAs, SLOs, and SLIs: A Guide to Service Reliability December 18, 2023
  • The complete flow of scheduling a POD in Kubernetes – short note December 17, 2023
  • Fetch Kubernetes node details for quick analysis of your worker nodes December 16, 2023
  • What is a Linux container? December 3, 2023
  • Advantages of Prometheus monitoring tool November 22, 2023
  • Kubernetes CNI, short explanations October 5, 2023
  • Monitoring Kubernetes cluster using Prometheus and Grafana September 6, 2023
  • Tweaking the application resources in a cost effective way + Kubernetes September 4, 2023
  • PromQL Wildcard Examples August 20, 2023
  • How to fix – Kubernetes objects stuck in terminating state? August 17, 2023
  • Protect Your Email Database from Outlook PST Corruption with These Strategies February 23, 2023
  • How to use SEO to build your brand February 15, 2023
  • All about s3cmd, the CLI to manage Amazon Simple Storage (S3) August 31, 2022
  • How to swap two variables in Python? August 29, 2022
  • How to add files/folders to an existing TAR archive? August 22, 2022

Comments

  • eero on Simple steps to install and configure sar (sysstat) on Ubuntu/Debian servers
  • tita on How to know the MySQL uptime from commandline – 3 Methods
  • ferahtia_FS on How to know the MySQL uptime from commandline – 3 Methods
  • wrkilu on 15+ maldet command switches and options with examples – Linux
  • Keith Salustro on 15+ maldet command switches and options with examples – Linux
  • Kotesh on How to update a Docker image with new changes?
  • Liana on How to install dig, nslookup, host commands in Linux
  • Jacob Tuz Poot on How to update a Docker image with new changes?
Copyright © 2025 Crybit.com. Theme: Creative Blog by Bishal Napit. Powered by WordPress.