How to install Node JS from source on Ubuntu 12.04

Node.js is a software platform for scalable server-side and networking applications. Node.js applications are written in JavaScript, and can be run within the Node.js runtime on Windows, Mac OS X and Linux with no changes. Node.js applications are designed to maximize throughput and efficiency, using non-blocking I/O and asynchronous events. Node.js applications run single-threaded, although […]
Continue reading…

 

How to install and configure Forever as a service to run Node.js application – Ubuntu 12.04

Forever is a beautiful tool to running Node.js process with monitoring. It will help you to keep up and running your Node.js application by restarting it if it failed.  In this article I will show you how to install Forever and configure it as a service to keep running on machine reboot. How to install […]
Continue reading…

 

Some useful commands for Ubuntu

Below are some useful commands for Ubuntu users. Privileges Commands sudo command – Run a command as root sudo su – To open the root shell sudo su user – To open shell as a user sudo -k – Forget your password sudo gksudo command – sudo visual dialog (GNOME) kdesudo command – sudo visual dialog (KDE) sudo visudo – To edit /etc/sudoers […]
Continue reading…

 

How to install and Configure Docker on Ubuntu 12.04 LTS

Docker is an open source project that automates the deployment of applications inside software containers. Docker is a tool that can package an application and its dependencies in a virtual container that can run on any Linux server. This helps enable flexibility and portability on where the application can run, whether on premise, public cloud, […]
Continue reading…

 

Log Management using Logstash and Kibana on CentOS/ RHEL / Ubuntu

Log files are one of the most important files where almost all useful or sometimes unnecessary information’s are stored in regard to your servers running state. Log files will help us to rescue or identify where or what went wrong if there is any security has been breached or compromised. Log files are the most […]
Continue reading…