Command that every Administrator shoud know [Dig command]

DIG(Domian information groper)

It is a DNS lookup utility.
It ping's DNS name servers.It performs DNS lookups and displays the answers that are returned from the name Server(s).
It is a flexible command so many admin's use it.

Unless explictly specified dig will try to get servers listed in


Simple usage

dig @server name type

It is name or ip address of the name server to query.
If no server argument is provided, dig consults /etc/resolv.conf and queries the name servers listed there

It is the name of the resource record that is to be looked up.
indicates what type of query is required - ANY, A, MX, SIG, etc. type can be any valid query type. If no type argument is supplied, dig will perform a lookup for an A record.

IT skills and their demand

Every IT professional thinks about Recession.
How secured is their job.
I have surfed online to bring you the latest info about IT industry
You will find answers to your questions like

What is the highest paid IT job?
What are the hot certifications

Now the hot jobs are available on LINUX , Solaris and VMWare products
for virtulization.

These are the areas of demand

1. Programming/Application Development
2. Help Desk/Technical Support
3. Project Management
4. Networking
5. Business Intelligence
6. Security
7. Web 2.0
8. Data Center
9. Telecommunications

Download the PDF analysis by footepartners for more details


POP3 in Pine

For those who use pine as their mail client

you can use pine with both local mail and with POP3 mail
without any tools like fetchmail or other tools to get POP mail first

These are multiple config files:

pine -p localmail
pine -p popserver1
pine -p popserver2

Configuring Pine to Use your pop3 server

Go to setup in programmes
Set your inbox-path:


now restart pine
enter password and connect to remote server
and use it as you are accessing your local mail

Security Concepts -User Accounts/Groups

User Accounts

Unique name
Unique ID
File ownership is determined by user ID


Unique name
Unique ID
Users who need access to the same files

The security of a Linux system is based on a user being assigned a unique name, user ID
(UID) and password. When a user logs in, the UID is used to validate all requests for file
When a file is created, the UID associated with the process that created the file is assigned
to the file. Only the owner or root can change the access permissions.
Users that require access to a set of files are placed in groups. A user can belong to
multiple groups. Each group has a unique name and Group ID (GID). Every user will
always be member of at least one group. This is called the primary group. In addition to
that, users may also be members of other groups. These are called secondary groups.