Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles on Trending Technologies
Technical articles with clear explanations and examples
How to Configure Proxy Settings on Ubuntu 20.04?
Proxy servers are intermediary servers that act as a gateway between a user's device and the internet. When connected through a proxy server, all data requests are first sent to the proxy server which then forwards them to the internet. This setup provides enhanced security, privacy, and network control for organizations and individuals. There are several types of proxies including HTTP proxies, HTTPS proxies, and SOCKS proxies. Each type serves different purposes with varying degrees of security and functionality. Understanding Proxy Settings on Ubuntu 20.04 Ubuntu 20.04 provides multiple methods to configure proxy settings, allowing you to ...
Read MoreHow to list all users in a Linux group?
In order to understand the commands to list all users in a Linux group, you first need to know how to list all users on the system. There are several ways to accomplish this, and one effective method is using the compgen command. The compgen command is a Linux utility that lists all commands executable in the terminal. When used with the -u flag, it displays all users present on the Linux system. compgen -u Output root daemon bin sys sync games man lp mail news uucp proxy www-data backup ... ...
Read MoreHow to Find the List of Daemon Processes and Zombie Processes in Linux
This article will guide you to understand zombie processes and daemon processes, and help you identify processes running in the background on Linux systems. What is a Zombie Process? When a process completes execution, it must report its exit status to its parent process. During this brief period, the process remains in the OS process table as a zombie process. The zombie indicates that the process will not be scheduled for future execution, but it cannot be completely removed until the parent process reads its exit status. When a child process completes, the parent process receives a ...
Read Morefd An Alternative to the Linux find Command
The fd command is a popular alternative to the find command in Linux. It is a faster and more user-friendly version of find, written in Rust for performance. Key features of fd include the ability to search using regular expressions, a more natural syntax for specifying search parameters, and the ability to search using specific file extensions or names. Installation The fd command can be installed on Linux and macOS using the package manager of your distribution. On Debian based distributions − sudo apt-get install fd-find On Fedora and CentOS − ...
Read MoreUnderstanding Time Command in Linux
As a Linux user, you must have come across the time command. It is a simple yet powerful command that allows you to measure execution time of a process. Whether you are a developer, system administrator, or just a curious user, understanding how the time command works is essential for optimizing your workflow and identifying bottlenecks in your system. What is the time Command? The time command is a Linux utility that measures the time it takes for a given command to execute. The command accepts a single argument, which is the command you want to measure. The ...
Read MoreViewing Files in Linux Using cat, more, and less
In Linux, we often need to view file contents without opening them in text editors like vi or vim. Three essential commands for file viewing are cat, more, and less. Each command serves different purposes depending on file size and viewing requirements. The cat command displays entire file content at once, while more and less provide paginated viewing for larger files. The cat Command The cat (concatenate) command is the most straightforward way to display file contents. It reads and displays the entire file content on the terminal screen. Basic File Viewing To display the complete ...
Read MoreAn Easy Way to Hide Files and Directories in Linux
As a Linux user, you might want to hide some of your files and directories from prying eyes. Perhaps you have sensitive data that you don't want others to see, or maybe you just want to keep your work organized. Whatever your reasons may be, hiding files and directories in Linux is a straightforward process that you can accomplish using various methods. In this article, we'll explore an easy way to hide files and directories in Linux. What is Hiding Files and Directories? Hiding files and directories means making them invisible to regular users when using standard commands ...
Read MoreHow to Hack Your Own Linux System?
As a Linux user, you may have heard the term "hacking" in relation to cybersecurity and assumed it was only used by malicious attackers. However, ethical hacking (also called penetration testing) can be used as a means of improving your own system's security by identifying vulnerabilities and potential entry points that could allow others to gain unauthorized access. By testing your own Linux system, you can identify these weaknesses before cybercriminals have a chance to exploit them. Preparing Your System for Ethical Hacking Installing Necessary Tools and Software Before attempting to test your Linux system, it is ...
Read MoreCentralized Secure Storage (iSCSI) - \"Initiator Client\" Setup on CentOS
Centralized secure storage is an essential component of many modern IT infrastructures. It allows multiple servers to access a shared storage pool, enabling higher flexibility, scalability, and availability. One popular method is iSCSI (Internet Small Computer System Interface), which enables servers to access remote storage over IP networks as if it were locally attached. What is iSCSI? iSCSI is a protocol that encapsulates SCSI commands and data into IP packets, allowing servers to communicate with remote storage devices over standard Ethernet networks. This creates a Storage Area Network (SAN) using existing network infrastructure, making it cost-effective compared to ...
Read MoreHow to list down all the available commands and aliases on Linux?
Linux provides a vast collection of commands and aliases that users can utilize in the terminal. These commands serve different purposes and can be executed from anywhere in the command line interface. Understanding how to list available commands and aliases is essential for efficient Linux system administration and usage. There are several approaches to discover all available commands in Linux. You can write custom shell scripts or use built-in shell functions designed for this purpose. The most effective method involves using the compgen command, which is a bash builtin specifically designed to list various shell components. Using the ...
Read More