Articles on Trending Technologies

Technical articles with clear explanations and examples

How to Do Security Auditing of Linux System Using Lynis Tool?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 400 Views

In today's world, where cyber threats and attacks have become more sophisticated and frequent, it is imperative to secure computer systems against malicious activities. A security audit is a systematic evaluation of the security of a computer system or network, which involves identifying potential vulnerabilities and addressing them before they are exploited by attackers. In this article, we will discuss how to perform a security audit on a Linux system using the Lynis tool. What is Security Auditing? Security auditing refers to the process of evaluating the security posture of a computer system or network by examining its ...

Read More

How to find all files with names containing a string on Linux?

Mukul Latiyan
Mukul Latiyan
Updated on 17-Mar-2026 4K+ Views

In Linux command line, finding all files with names containing a specific string is accomplished using the grep command. The grep command is a powerful text processing utility that searches for patterns within files and displays matching lines. The grep command filters searches in files for particular patterns of characters. It is one of the most frequently used Linux utilities for displaying lines that contain the pattern you are searching for. The pattern being searched is typically referred to as a regular expression. Syntax grep [options] pattern [files] Common grep Options -c ...

Read More

What are the different tasks in the real time system?

Bhanu Priya
Bhanu Priya
Updated on 17-Mar-2026 1K+ Views

Real-time systems are designed to respond to events within strict timing constraints. Unlike general-purpose systems where performance is measured by throughput, real-time systems prioritize meeting deadlines. These systems must guarantee that critical tasks complete within their specified time limits to ensure correct system behavior. In embedded systems, real-time characteristics include − The system responds to an event or request within timing constraints System must use a real-time operating system that can interrupt a running task The system must be predictable, guaranteeing that important tasks run within fixed time constraints Real-time systems are classified based on ...

Read More

Deadlock with mutex locks

Arnab Chakraborty
Arnab Chakraborty
Updated on 17-Mar-2026 7K+ Views

Deadlock can occur in multithreaded Pthread programs when multiple threads compete for mutex locks in conflicting orders. This happens when threads acquire locks in different sequences, potentially creating a circular dependency where each thread waits for resources held by others. Mutex Lock Initialization An unlocked mutex is initialized using the pthread_mutex_init() function. Threads acquire and release mutex locks using pthread_mutex_lock() and pthread_mutex_unlock() respectively. If a thread attempts to acquire an already locked mutex, the call to pthread_mutex_lock() blocks the thread until the owner releases the lock. Example − Deadlock Scenario Consider the following example where two ...

Read More

Performance Monitoring with Monitorix on Ubuntu 16.04

Sharon Christine
Sharon Christine
Updated on 17-Mar-2026 303 Views

Monitorix is a free, open-source, lightweight system monitoring tool designed to monitor as many services and system resources as possible. It has been created for production Linux/UNIX servers but due to its simplicity and small size, it can also be used on embedded devices. This article explains how to install and configure Monitorix on Ubuntu 16.04. Features of Monitorix Monitorix provides comprehensive monitoring capabilities including CPU usage, memory consumption, disk I/O, network traffic, system load, and various services. It generates detailed graphs and reports accessible through a web interface, making it easy to track system performance over time. ...

Read More

The "Oldconfig" Target In The Linux Kernel Makefile

Kunal Verma
Kunal Verma
Updated on 17-Mar-2026 835 Views

The Linux kernel provides various configuration targets through its Makefile system to help developers and system administrators build customized kernels. The oldconfig target is a crucial configuration option that allows you to update an existing kernel configuration while preserving your previous settings and only prompting for new options introduced in newer kernel versions. Note − Linux commands are case-sensitive. Understanding the Kernel Build System The Linux kernel build system uses a sophisticated Makefile structure to manage the compilation process. The configuration system determines which features, drivers, and subsystems get included in the final kernel image. There are ...

Read More

APT vs APT-GET What\'s Difference

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 8K+ Views

If you're a Linux user, you may have come across the terms APT and APT-GET before. While both terms refer to package managers used to install and manage software on Debian-based Linux distributions like Ubuntu, they have some key differences. In this article, we'll explore the differences between APT and APT-GET, and how they affect the way you manage software on your system. What is APT? APT, short for Advanced Package Tool, is a command-line package manager used on Debian-based Linux distributions. It's the primary package manager used on Ubuntu, and it can be used to install, update, ...

Read More

CI_CD Security - How to Secure Your CI_CD Pipeline?

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 277 Views

If you're using Continuous Integration and Continuous Deployment (CI/CD) pipelines in your software development process, it's important to ensure that your pipeline is secure. CI/CD pipelines are a powerful tool for automating software delivery, but they can also be a target for attackers looking to exploit vulnerabilities. In this article, we'll discuss how to secure your CI/CD pipeline to ensure that your software delivery process is safe and secure. Why Secure Your CI/CD Pipeline? CI/CD pipelines are a valuable tool for software development teams because they automate the process of building, testing, and deploying code. However, these pipelines ...

Read More

How to Downgrade RHELCentOS to Previous Minor Release?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 414 Views

In the world of enterprise-level Linux operating systems, Red Hat Enterprise Linux (RHEL) and its derivative, CentOS, are two of the most widely used distributions. They offer a stable and robust platform that is trusted by many organizations worldwide. However, sometimes it may become necessary to downgrade to a previous minor release due to compatibility issues or other reasons. In this article, we will show you how to downgrade RHEL/CentOS to a previous minor release safely. Preparing for Downgrade Backing up data and configurations Before beginning the process of downgrading your RHEL/CentOS system, it is essential ...

Read More

How to find out which process was killed by Linux OOM killer?

Mukul Latiyan
Mukul Latiyan
Updated on 17-Mar-2026 903 Views

The Out of Memory (OOM) killer is a Linux kernel mechanism that terminates processes when the system runs out of available memory. When a process is killed by the OOM killer, the system logs this information to help administrators identify which processes were terminated and why. To find out which process was killed by the Linux OOM killer, we use the grep command to search through system log files. The grep command filters searches in files for specific patterns and is essential for analyzing log data. Basic grep Command Syntax grep [options] pattern [files] ...

Read More
Showing 8381–8390 of 61,297 articles
« Prev 1 837 838 839 840 841 6130 Next »
Advertisements