{"title":"Knowledge Base","link":[{"@attributes":{"rel":"alternate","type":"text\/html","href":"https:\/\/wker.com\/kb\/"}},{"@attributes":{"rel":"self","type":"application\/atom+xml","href":"https:\/\/wker.com\/kb\/atom.xml"}}],"id":"tag:wker.com,2021-01-11:\/kb\/\/2","updated":"2021-03-12T01:05:51Z","entry":[{"title":"How to Update cURL to the Latest Version on CentOS","link":{"@attributes":{"rel":"alternate","type":"text\/html","href":"https:\/\/wker.com\/kb\/2021\/03\/how-to-update-curl-to-the-latest-version-on-centos.php"}},"id":"tag:wker.com,2021:\/kb\/\/2.10","published":"2021-03-12T00:31:08Z","updated":"2021-03-12T01:05:51Z","summary":"cURL shipped with the OS may not be up-to-date, and if you need the newer version for a particular requiment, you need to update it to the latest version. In this post, I will guide you to update cURL to...","author":{"name":"admin"},"category":[{"@attributes":{"term":"Server Management"}},{"@attributes":{"term":"centos","label":"centos"}},{"@attributes":{"term":"curl","label":"curl"}},{"@attributes":{"term":"update","label":"update"}},{"@attributes":{"term":"yum","label":"yum"}}],"content":{"@attributes":{"type":"html"}}},{"title":"How to Manage MySQL Databases and Users from the Command Line","link":{"@attributes":{"rel":"alternate","type":"text\/html","href":"https:\/\/wker.com\/kb\/2021\/02\/how-to-manage-mysql-databases-and-users-from-the-command-line.php"}},"id":"tag:wker.com,2021:\/kb\/\/2.9","published":"2021-02-07T07:26:29Z","updated":"2021-02-08T00:20:15Z","summary":"MySQL or MariaDB is the most popular open-source relational database system. MySQL server allows us to create numerous users and databases and grant appropriate privileges so that the users can access and manage databases. In this post, I will explains...","author":{"name":"admin"},"category":[{"@attributes":{"term":"Server Management"}},{"@attributes":{"term":"command","label":"command"}},{"@attributes":{"term":"database","label":"database"}},{"@attributes":{"term":"mysql","label":"mysql"}},{"@attributes":{"term":"root","label":"root"}}],"content":{"@attributes":{"type":"html"}}},{"title":"How to Secure a SSH Server","link":{"@attributes":{"rel":"alternate","type":"text\/html","href":"https:\/\/wker.com\/kb\/2021\/01\/how-to-secure-a-ssh-server.php"}},"id":"tag:wker.com,2021:\/kb\/\/2.8","published":"2021-01-25T01:49:36Z","updated":"2021-01-25T06:42:58Z","summary":"Security is the first priority for server management. Although there were some vulnerabilities, OpenSSH is fairly secure by default. There are still some steps left that can be improved. In this post, I'll show you how to secure SSH Server....","author":{"name":"admin"},"category":[{"@attributes":{"term":"Server Management"}},{"@attributes":{"term":"linux","label":"linux"}},{"@attributes":{"term":"security","label":"security"}},{"@attributes":{"term":"ssh","label":"ssh"}}],"content":{"@attributes":{"type":"html"}}},{"title":"Manage Linux Users with Command passwd","link":{"@attributes":{"rel":"alternate","type":"text\/html","href":"https:\/\/wker.com\/kb\/2021\/01\/manage-linux-users-with-command-passwd.php"}},"id":"tag:wker.com,2021:\/kb\/\/2.7","published":"2021-01-19T11:32:04Z","updated":"2021-01-19T11:33:02Z","summary":"Linux is a multi-user system, because it allows multiple people to use a computer and not affect each other's files, processes, preferences, etc. As there could be multiple users on the system, it is necessary to manage their authentication. In...","author":{"name":"admin"},"category":[{"@attributes":{"term":"Server Management"}},{"@attributes":{"term":"command","label":"command"}},{"@attributes":{"term":"linux","label":"linux"}},{"@attributes":{"term":"passwd","label":"passwd"}},{"@attributes":{"term":"user","label":"user"}}],"content":{"@attributes":{"type":"html"}}},{"title":"How to Recover MySQL Root Password","link":{"@attributes":{"rel":"alternate","type":"text\/html","href":"https:\/\/wker.com\/kb\/2021\/01\/how-to-recover-mysql-root-password.php"}},"id":"tag:wker.com,2021:\/kb\/\/2.6","published":"2021-01-18T08:26:56Z","updated":"2021-01-18T08:33:01Z","summary":"If you are a system administrator, you may have forgotten your mysql root password, don't worry, it happens to all of us. In this post, I will show you how to recover mysql root password for Linux system. First, by...","author":{"name":"admin"},"category":[{"@attributes":{"term":"Server Management"}},{"@attributes":{"term":"mariadb","label":"mariadb"}},{"@attributes":{"term":"mysql","label":"mysql"}},{"@attributes":{"term":"password","label":"password"}},{"@attributes":{"term":"root","label":"root"}}],"content":{"@attributes":{"type":"html"}}},{"title":"Connect to a Server Using an SSH Key","link":{"@attributes":{"rel":"alternate","type":"text\/html","href":"https:\/\/wker.com\/kb\/2021\/01\/connect-to-a-server-using-an-ssh-key.php"}},"id":"tag:wker.com,2021:\/kb\/\/2.5","published":"2021-01-17T07:33:55Z","updated":"2021-01-17T08:41:10Z","summary":"In this post I will describe how to connect to remote server using SSH Key instead of password. Prerequisites An SSH Key A Linux server with SSH Key login enabled Connect via PuTTY PuTTY is the most popular SSH client...","author":{"name":"admin"},"category":[{"@attributes":{"term":"Server Management"}},{"@attributes":{"term":"linux","label":"linux"}},{"@attributes":{"term":"ssh","label":"ssh"}},{"@attributes":{"term":"windows","label":"windows"}}],"content":{"@attributes":{"type":"html"}}},{"title":"How to Add SSH Keys to Remote Server","link":{"@attributes":{"rel":"alternate","type":"text\/html","href":"https:\/\/wker.com\/kb\/2021\/01\/how-to-add-ssh-keys-to-remote-server.php"}},"id":"tag:wker.com,2021:\/kb\/\/2.4","published":"2021-01-14T02:15:49Z","updated":"2021-01-14T07:13:56Z","summary":"After generating ssh keys, we have to add public key to remote server before we use them. In this post, I will quickguide how to add ssh keys to remote server. Add SSH Keys with ssh-copy-id Utility The ssh-copy-id utility...","author":{"name":"admin"},"category":[{"@attributes":{"term":"Server Management"}},{"@attributes":{"term":"linux","label":"linux"}},{"@attributes":{"term":"ssh","label":"ssh"}}],"content":{"@attributes":{"type":"html"}}},{"title":"How Do I Generate SSH Keys?","link":{"@attributes":{"rel":"alternate","type":"text\/html","href":"https:\/\/wker.com\/kb\/2021\/01\/how-do-i-generate-ssh-keys.php"}},"id":"tag:wker.com,2021:\/kb\/\/2.3","published":"2021-01-11T06:41:21Z","updated":"2021-01-14T01:36:29Z","summary":"An SSH key allows you to log into your server without a password. This guide describes how to create SSH keys using a Linux or Mac system. Create an SSH Key with OpenSSH OpenSSH is standard and should be present...","author":{"name":"admin"},"category":[{"@attributes":{"term":"Server Management"}},{"@attributes":{"term":"linux","label":"linux"}},{"@attributes":{"term":"macos","label":"macos"}},{"@attributes":{"term":"openssh","label":"openssh"}},{"@attributes":{"term":"ssh","label":"ssh"}},{"@attributes":{"term":"windows","label":"windows"}}],"content":{"@attributes":{"type":"html"}}}]}