Record all commands input & output using script

Have you ever thought of recoding everything printed on your terminal!!

If yes you might have come across the ‘script’  , if not I will have it explained here:

script makes a typescript of everything printed on your terminal

If you want to start recording you need to type the following command from your terminal


You should see similar to the following output if you don’t mention any file location

Script started, file is typescript

From now it will record all the command line activity.When you’re finished recording whatever it is that you want to record, type [Ctrl]-d or exit, and your script session will end.

Output when you end your session as follows

Script done, file is typescript


Creating Postfix Mail Server


Below are the steps included in creating the Postfix Mail server:

#yum install postfix*

#chkconfig postfix on

#service postfix restart

Postfix configuration file: /etc/postfix/

#vim /etc/postfix/

Here in this config file search for the word ‘ inet ‘ and remove the hash symbol at inet-interfaces = all

Add hash symbol at localhost i.e.

#inet_interfaces = localhost

Remove # from myorigin i.e.

myorigin = $mydomain

Write an additional line like

mydomain =

write additional line like:

myhostname =

mydestination =$myhome, localhost.$mydomain, localhost, all

save the file and exit

Now restart the service i.e.

#service postfix restart

Now add the users that you wish to have this mail server.

Lets suppose 2 users like user1 & user2:

Now from the client side these two users can mail to each-other.

Example: If user1 have to send mail to user2 then:


How to avoid online identity theft

I happened to read this article from by Sunil Srivastava and found it as worth sharing for my readers.
IImagen today’s cyber world, where most of your personal information is online, it’s easy for fraudsters to steal and misuse it. Here’s a look at the way they can trick you and what you can do to protect yourself.

How your identity can be stolen?


As the name suggests, it’s simply someone looking over your shoulder or using a mobile phone to click a photo while you are using your credit card, keying in your PIN at an ATM, filling up important information in a form or cheque, or just typing your password.


Also known as RFID (radio frequency identification) theft, it steals the personal information that is stored on cards with RF chips embedded in them, such as your office ID tags.


A domain is hijacked by a criminal, who then steals the data of any user who accesses the website.


It stands for malicious software and includes anything that can be used to gain access to your PC and steal data from it. This could be through spyware, keyloggers, Trojanhorse, adware, worm or virus. It disguises itself as something innocuous and stays hidden in your PC.


An e-mail from a seemingly reliable and known source will direct you to a phony website that looks legitimate. It will ask you to input personal and financial data to access the site, and then steal that information.


A fraudster pretends to call up from your bank or service provider claiming to need your personal details because they are upgrading you or updating data.


The secret information in the magnetic strip of your credit/debit card is copied and then used on a counterfeit card.


You will receive a text message on your mobile phone informing you of a service that you have signed up for or stopped. If you click on the link provided or call the number given, you will be told that you can proceed only after providing essential information.

How to protect yourself?

Here are 8 ways to be vigilant and safeguard your identity.


Scrutinise all correspondence from financial institutions and shred it . Ensure all such e-mails are protected by passwords. Tear your ATM slips and cancelled cheques, don’t just crumple them when you throw them in the trash.


Before disposing of your old gadgets, completely wipe out the memory or any data on it. Even an SMS or mail from your bank can be misused. Remove sensitive data before lending your phone, laptop or pen drives.