Abhijit Sandhan

Abhijit Sandhan

Loves Linux, Blogging, Traveling, Hiking and sharing Knowledge!

VIM Text Editor Keyboard Commands

Vim is a highly configurable text editor built to enable efficient text editing. It is an improved version of the vi editor distributed with most UNIX systems. Vim is often called a "programmer's editor," and so useful for programming that many consider it an entire IDE. It's not just for programmers, though. Vim is perfect for all kinds of text …

Read More »

Gmail Hotmail Yahoo Email Alerts on Mobile by SMS

email-alerts-mobile-150x150

I am extremely excited to let you know geeky guys that Blackberry is not only the option for emails now... After experimenting for some days, here is the cool way to get email alert of any email service provider on your  mobile by sms. Tests were conducted with way2sms and Windows live hotmail and was observed that hotmail is more secured and …

Read More »

Facebook Secure Browsing Settings HTTPS

Now, Facebook provides you with the ability to experience Facebook entirely over HTTPS. You should consider enabling this option if you frequently use Facebook from public Internet access points found at coffee shops, airports, libraries or schools. The option will exist as part of our advanced security features, which you can find in the "Account Security" section of the Account …

Read More »

Exim Error : lowest numbered MX record points to local host exim

Exim is a message transfer agent (MTA) and widely used an alternative for sendmail. Sometimes, there is no problem in sending emails but emails are not recieved at recievers end.     The first you should do is to check the exim mainlog using following command tail -f /var/log/exim_mainlog If you can see the error as below 2011-04-22 01:30:47 H=mail-xxx-xxx.domain.com …

Read More »

How to Install RkHunter on Linux Server

Rootkit (RkHunter) scanner is scanning tool to ensure you for about 99.9%* you're clean of nasty tools. This tool scans for rootkits, backdoors and local exploits by running tests like:MD5 hash compare, Look for default files used by rootkits, Wrong file permissions for binaries,Look for suspected strings in LKM and KLD modules, Look for hidden files,Optional scan within plaintext and …

Read More »