Skip to content
TeckLyfe

TeckLyfe

We're your center for technology focusing on InfoSec, Cybersecurity, Privacy, Security, System Administration and How-To's.

  • Home
  • InfoSec
    • Server Hardening
    • Attacks
    • Malware
    • Pentest
    • Phishing
    • Ransomware
    • Virus
    • Zero-Day
  • SysAdmin
    • Cisco
    • Linux
    • Mac
    • Windows
  • Tech
    • Apps
    • Gadgets
    • Gaming
    • Internet
    • Mobile
      • Smartphone
    • OS
    • Tech Tips
  • Follow Us
    • Facebook
    • X aka Twitter
    • LinkedIn
    • YouTube
    • Reddit
    • RSS Feed

Tag: linux

  • Home
  • linux
  • Page 2
Adjusting Child Processes For PHP-FPM Nginx - Fix Server Reached pm.max_children Setting 1
Linux System Administration

Adjusting Child Processes For PHP-FPM Nginx – Fix Server Reached pm.max_children Setting

As an addition to my previous NGINX articles, today we’ll discuss how to adjust the number of child processes for PHP-FPM to fix the common error of “server reached pm.max_children”

March 4, 2017
Continue Reading...
Fix Ubuntu TimeDateCTL NTP Sync No 3
Linux System Administration

Fix Ubuntu TimeDateCTL NTP Sync No

I recently came across an issue where an Ubuntu 14.04 LTS server wasn’t syncing the time so the jitter and drifting of the time wasn’t correcting itself. This caused issues

October 31, 2016November 7, 2016
Continue Reading...
How To Change Your DNS On Windows, Mac, or Linux 4
Technology Linux Mac Windows

How To Change Your DNS On Windows, Mac, or Linux

A DNS server resolves website URLs into their IP addresses, which is how the internet functions. Without DNS, we would be typing in IP addresses into our browsers instead of

October 21, 2016April 6, 2017
Continue Reading...
How To Patch Linux Kernel Zero Day DirtyCow Vulnerability CVE-2016-5195 5
Linux Security System Administration Zero-Day

How To Patch Linux Kernel Zero Day DirtyCow Vulnerability CVE-2016-5195

A zero-day local privilege escalation vulnerability has been found in the Linux kernel that has existed since 2005, being called DirtyCow. This bug affects a large number of popular Linux

October 21, 2016
Continue Reading...
HTTP/2, HTTPS, Let’s Encrypt, NGINX and WordPress Hardening 6
Server Hardening Security System Administration

HTTP/2, HTTPS, Let’s Encrypt, NGINX and WordPress Hardening

If you’re running a WordPress site on a Linux server running NGINX, then you might be interested in setting up a free SSL (HTTPS) certificate using Let’s Encrypt. The internet

October 15, 2016January 16, 2017
Continue Reading...
How To Install Tor Browser In Kali Linux 7
Apps Internet

How To Install Tor Browser In Kali Linux

Tor is free software and an open network. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents

September 10, 2016January 4, 2020
Continue Reading...
How To Install Google Chrome on Ubuntu, Kali, Mint, Debian 8
Linux

How To Install Google Chrome on Ubuntu, Kali, Mint, Debian

If you’re using a version of Debian Linux like Ubuntu, Kali, Mint, etc, then this tutorial will help you in getting Google Chrome running on your system. The commands will

September 7, 2016October 16, 2016
Continue Reading...
Tech Tips

Configure Sendmail on Slackware 9.1

Since I’m fairly new at Linux and I have successfully got sendmail working on my server for my domain, I thought I would write this walkthrough to help others configure

March 3, 2004October 16, 2016
Continue Reading...

Posts pagination

Previous 1 2
  • About Us
  • Privacy Policy
  • Advertise With Us
  • Contact Us
We’re your center for technology focusing on InfoSec, Cybersecurity, Privacy, Security, System Administration and How-To’s.

Founded in 2000, TeckLyfe is based in Chicago, IL. Reproduction without explicit permission is prohibited.

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
© 2000-2025 - TeckLyfe.com - All Rights Reserved. Reproduction without explicit permission is prohibited.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}