Articles on Trending Technologies

Technical articles with clear explanations and examples

Differentiate between user and control register in CPU.

Bhanu Priya
Bhanu Priya
Updated on 17-Mar-2026 1K+ Views

CPU registers are divided into two main categories based on their accessibility and purpose: user registers and control registers. User registers can be directly accessed by machine instructions and are used for general computation, while control registers manage CPU behavior and can only be accessed in privileged mode. User Registers User registers can be read or written by machine instructions and are available to both user-level and system-level programs. These registers are divided into data registers and address registers. Data Registers These registers hold numeric data values like integers and, in some architectures, floating-point values, characters, ...

Read More

What is loopback address?

Arnab Chakraborty
Arnab Chakraborty
Updated on 17-Mar-2026 4K+ Views

The loopback address is a special IP address range (127.0.0.0 – 127.255.255.255) reserved for internal communication within a single computer system. The most commonly used loopback address is 127.0.0.1, also known as localhost. This address allows processes on the same machine to communicate with each other through the network stack without requiring physical network hardware. How Loopback Addresses Work When a process sends data to a loopback address, the operating system intercepts the packet and routes it back to itself internally. The data never leaves the computer or passes through the Network Interface Card (NIC). Instead, it is ...

Read More

How to Call an External Program Using awk

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

Awk is a powerful text processing tool that can automate various tasks such as data manipulation, filtering, and reporting. One of its most interesting features is the ability to call external programs from within an awk script, extending its functionality beyond text processing. Understanding the system() Function The system() function is used to execute external commands from within awk. The syntax is straightforward: system(command) The command argument is the external command you want to execute. When system() is called, awk passes the command to the shell for execution. The shell executes the command and ...

Read More

Guide to the Linux read Command

Bamdeb Ghosh
Bamdeb Ghosh
Updated on 17-Mar-2026 5K+ Views

The read command in Linux is a built-in shell command used to read input from the user, files, or other commands. It captures input and stores it in variables, making it essential for interactive scripts and automated data processing. The read command is commonly used in shell scripting to create user-friendly interfaces and process structured data. Basic Syntax and Usage The most basic use of the read command is to capture user input into a variable: read variable_name Simple Input Example $ read name Somdeb $ echo "Hello $name" ...

Read More

Add, Update, and Remove Git Submodule

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 4K+ Views

Git submodules are a powerful feature that allows you to incorporate external repositories as subdirectories within your project. This enables code reuse from other repositories while maintaining independent version control for both the parent project and submodules. In this article, we will explore how to add, update, and remove Git submodules with practical examples and best practices for effective submodule management. Adding a Git Submodule To add a new submodule to your project, use the git submodule add command. This command takes the URL of the submodule repository and the local path where it should be placed. ...

Read More

10 ‘free’ Commands to Check Memory Usage in Linux

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 5K+ Views

If you are a Linux user, you may have heard of the term memory usage. Memory usage refers to the amount of memory being used by your computer at any given time. It is an important metric to keep track of, as excessive memory usage can cause your system to slow down or even crash. Fortunately, Linux provides a built-in tool called free that allows you to check your system's memory usage. In this article, we will go over how to use the free command to check memory usage in Linux. What is the free Command? The free ...

Read More

Maekawa\'s Algorithm for Mutual Exclusion in Distributed System

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 3K+ Views

Multiple processes may require concurrent access to common resources in a distributed system. Concurrent access to a shared resource, however, may result in errors and inconsistencies. A distributed mutual exclusion algorithm must be employed to manage access to shared resources in order to guarantee mutual exclusion. Maekawa's Algorithm is a distributed mutual exclusion technique that ensures mutual exclusion between running processes in a distributed system. Only one process at a time can access a shared resource thanks to the algorithm, which is based on a voting system. How Maekawa's Algorithm Works The voting-based algorithm was proposed in ...

Read More

How to Generate a Certificate Signing Request (CSR) With OpenSSL?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

A Certificate Signing Request (CSR) is a digital document containing information about the entity requesting an SSL/TLS certificate. The CSR includes the public key and identifying information such as organization name, domain, and location. This information enables a Certificate Authority (CA) to verify the requester's identity and issue a valid SSL/TLS certificate. The CSR is essential for obtaining SSL/TLS certificates because it provides the verification mechanism for domain ownership and organizational identity. Without a properly generated CSR, you cannot secure your website with encryption. Understanding OpenSSL and Its Components OpenSSL is an open-source cryptographic toolkit that provides ...

Read More

Create an Active Directory Infrastructure with Samba4 on Ubuntu

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 4K+ Views

Active Directory is a powerful directory service for managing users, groups, and computers in a Windows environment. Samba4 is an open-source implementation that provides a complete Active Directory infrastructure on Linux systems. This tutorial demonstrates how to set up an Active Directory domain controller using Samba4 on Ubuntu. Prerequisites Before starting, ensure your Ubuntu system has a static IP address and proper hostname resolution. You'll also need administrative privileges and network connectivity. Step 1: Install Required Packages Install Samba4 and all necessary dependencies for Active Directory functionality − sudo apt update sudo apt install ...

Read More

How to grep a string in a directory and all its subdirectories in Linux?

Mukul Latiyan
Mukul Latiyan
Updated on 17-Mar-2026 4K+ Views

The grep command in Linux is used to search for specific patterns or strings within files. It is one of the most essential Linux utilities for filtering and finding text content across files and directories. The pattern we search for is typically called a regular expression, and grep can search through single files, multiple files, or entire directory structures. Basic Syntax grep [options] pattern [files] Common Options Option Description -r or -R Search recursively through directories and subdirectories -n Display line numbers with matched ...

Read More
Showing 8451–8460 of 61,297 articles
« Prev 1 844 845 846 847 848 6130 Next »
Advertisements