Articles on Trending Technologies

Technical articles with clear explanations and examples

Calculate an MD5 Checksum of a Directory in Linux

Pradeep Jhuriya
Pradeep Jhuriya
Updated on 17-Mar-2026 4K+ Views

During our daily use of Linux, we may want to check if there are any changes to any of the files in a directory. Or we might want to confirm that the contents of one directory are the same as those of another directory on a different location, disk, or system. In this tutorial we will learn how to compute an MD5 checksum of an entire directory tree on Linux. We will compute a single hash value of all directory contents for comparison purposes. Get the List of All Files in a Directory Tree To find out the ...

Read More

When to Use xargs in Linux?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 384 Views

When it comes to working with command-line utilities in Linux, there are many tools and utilities available that can make your life easier. One such utility is xargs, a command that allows you to execute commands on a list of files, or arguments, from standard input. Xargs is particularly useful when you want to perform an operation on a large number of files, and you want to do it quickly and efficiently. In this article, we will discuss various scenarios where you may need to use xargs in Linux. We will also look at some examples to illustrate how ...

Read More

How to Fix MySQL ERROR 1819 (HY000) in Linux?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 7K+ Views

MySQL ERROR 1819 (HY000) is a common error that occurs when attempting to create or modify a MySQL user account with a password that doesn't meet the server's security policy requirements. The error message typically reads: "Your password does not satisfy the current policy requirements". Why Does MySQL ERROR 1819 Occur? This error occurs primarily due to MySQL's password validation plugin, which enforces strict password policies to enhance security. The plugin was introduced in newer MySQL versions and requires passwords to meet specific criteria such as: Minimum length requirements (typically 8 characters) Use of uppercase and ...

Read More

What is the maximum number of threads per process in Linux?

Mukul Latiyan
Mukul Latiyan
Updated on 17-Mar-2026 2K+ Views

Linux manages thread allocation through several system parameters and limits. The maximum number of threads per process is determined by multiple factors including system-wide thread limits, virtual memory availability, and stack size configurations. System-Wide Thread Limit The first approach to check the maximum number of threads is to examine the system-wide limit: cat /proc/sys/kernel/threads-max 61741 This value represents the total number of threads that can exist on the entire system. You can modify this limit using: echo 123456789 > /proc/sys/kernel/threads-max where 123456789 is your desired maximum thread ...

Read More

Operating System Design Goals

David Meador
David Meador
Updated on 17-Mar-2026 8K+ Views

Operating Systems have become quite complex and multifaceted with the advancement of time. However, that also means it is getting more and more difficult to design operating systems that satisfy all the specifications required these days. There are no complete solutions possible for design problems, but some approaches are more successful than others. Design Requirements in Operating System The design requirements are quite hard to specify in an operating system. They are basically divided into two parts: User design requirements and System design requirements. Details about these are given as follows − User Design Requirements The ...

Read More

Dining Philosophers Problem (DPP)

Kristi Castro
Kristi Castro
Updated on 17-Mar-2026 46K+ Views

The Dining Philosophers Problem (DPP) is a classic synchronization problem in computer science that illustrates the challenges of deadlock and resource sharing in concurrent systems. The problem states that there are 5 philosophers sharing a circular table where they eat and think alternatively. There is a bowl of rice for each philosopher and 5 chopsticks placed between them. A philosopher needs both their right and left chopstick to eat. A hungry philosopher may only eat if both chopsticks are available, otherwise they put down any chopstick they hold and begin thinking again. This problem demonstrates a large class of ...

Read More

Advanced local procedure call (ALPC)

Arnab Chakraborty
Arnab Chakraborty
Updated on 17-Mar-2026 2K+ Views

Advanced Local Procedure Call (ALPC) is a high-performance message-passing mechanism in Windows that enables efficient inter-process communication (IPC) between client and server processes. ALPC replaced the older Local Procedure Call (LPC) mechanism and provides optimized communication channels with multiple message-passing techniques based on data size requirements. How ALPC Works The ALPC mechanism follows a client-server communication model. The server process publishes a globally visible connection-port object that clients can access to request services. When a client needs services from a subsystem, it opens a handle to the server's connection-port and sends a connection request. ...

Read More

Filtering Files Copied When Using rsync on Linux

Pradeep Jhuriya
Pradeep Jhuriya
Updated on 17-Mar-2026 980 Views

The Linux command-line utility rsync is a powerful and flexible tool for synchronizing files and directories across different computers and locations. It is commonly used for backups, file transfers, and data replication. One of the main features of rsync is its ability to filter files based on various criteria such as file type, size, and modification time. Rsync Overview Rsync works by comparing the source and destination directories and copying only the files that have changed or been added to the source directory. This feature makes rsync ideal for transferring large amounts of data over networks, as it ...

Read More

How to Fix No route to host SSH Error in Linux?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 50K+ Views

SSH (Secure Shell) is a network protocol that provides secure encrypted communication between two systems over a network. It is widely used for remote system administration, file transfers, and executing commands on remote machines. However, SSH connections can sometimes fail with various error messages, one of the most common being "No route to host". The "No route to host" error indicates that your local system cannot establish a network path to reach the remote SSH server. This error occurs at the network level before any SSH authentication takes place, making it a connectivity issue rather than an SSH configuration ...

Read More

How To Use The Bash read Command?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 6K+ Views

The read command is one of the most fundamental commands in Bash scripting. It is used to read input from the user or from a file. In this article, we will explore how to use the read command effectively, with several examples and their output. Basic Usage of read Command The most basic usage of the read command is to take input from the user. Here's a simple example − Example echo "Please enter your name: " read name echo "Hello, $name" When you run this script, it will prompt you to enter ...

Read More
Showing 9071–9080 of 61,297 articles
« Prev 1 906 907 908 909 910 6130 Next »
Advertisements