Found 2065 Articles for Operating System

Starting a Shell in Alpine Docker Container

Satish Kumar
Updated on 23-Mar-2023 16:25:36

3K+ Views

Docker is a widely popular open-source tool that simplifies process of creating, deploying, and running applications within containers. Alpine, on other hand, is a lightweight Linux distribution that is optimized for Docker containers, making it a perfect choice for those who want to keep their images small and efficient. In this article, we will explore how to start a shell in Alpine Docker container, and provide several examples that will demonstrate its usage and benefits. What is a Shell in a Docker Container? Before we dive into how to start a shell in Alpine Docker container, it is essential to ... Read More

Combine and Execute Multiple Linux Commands

Satish Kumar
Updated on 23-Mar-2023 16:21:10

563 Views

Linux is a powerful and versatile operating system that has gained immense popularity in computing world. One of most useful features of Linux is ability to combine and execute multiple commands at once, which can significantly improve your productivity and efficiency. In this article, we will discuss various techniques for combining and executing multiple Linux commands, along with examples that demonstrate their practical applications. Combining Commands with Pipes The most common way to combine Linux commands is by using pipes. A pipe is a feature that allows output of one command to be passed as input to another command. syntax ... Read More

Command Substitution in Bourne Shell

Satish Kumar
Updated on 23-Mar-2023 16:19:40

214 Views

Introduction In world of Unix and Linux, Bourne shell is a popular and widely used command-line interface for interacting with operating system. One of most powerful features of Bourne shell is command substitution, which allows you to use output of one command as input for another. This article will explore command substitution in Bourne shell, including how it works, why it's useful, and some practical examples. What is Command Substitution? In Bourne shell, command substitution is a feature that allows you to take output of one command and use it as input for another command. This is done by enclosing ... Read More

How to End Processes With kill, pkill, and killall

Satish Kumar
Updated on 23-Mar-2023 16:17:44

3K+ Views

When working with a Unix-based operating system such as Linux or macOS, it is common to encounter situations where a process becomes unresponsive or needs to be terminated for some reason. Fortunately, there are several command-line utilities available that allow users to end processes in a variety of ways. In this article, we will explore three of most commonly used utilities for terminating processes: kill, pkill, and killall. We will cover their basic usage, common options, and examples of how they can be used to manage processes on a Unix system. Basic usage of kill, pkill, and killall Before diving ... Read More

Connecting From Docker Containers to Resources in Host

Satish Kumar
Updated on 23-Mar-2023 15:13:20

1K+ Views

Introduction Docker is a popular platform that enables users to run and manage applications inside containers. Docker containers provide a lightweight and efficient way of isolating applications and their dependencies from underlying host system. However, in some cases, it may be necessary to connect from a Docker container to resources in host system. This article will discuss various ways to connect from Docker containers to resources in host. Accessing Host System By default, Docker containers are isolated from host system. This means that they cannot access any resources in host system unless specific configuration is done. following are some ways ... Read More

Why Do We Use su – and Not Just su

Satish Kumar
Updated on 23-Mar-2023 10:45:01

946 Views

Introduction The Linux operating system is a powerful tool that offers a wide range of features and functionalities to its users. One of most common tasks performed by system administrators on Linux systems is to switch to root user account using su command. However, in some cases, it is recommended to use su – instead of just su. In this article, we will explore reasons behind using su – and provide examples of how it can be beneficial. What is difference between su and su –? The su command is used to switch to another user account on system, typically ... Read More

Easy Ways to Determine Virtualization Technology

Satish Kumar
Updated on 23-Mar-2023 10:31:49

102 Views

Virtualization technology has been a game-changer for IT industry, offering businesses and organizations an efficient and cost-effective solution to manage their IT infrastructure. Virtualization enables organizations to consolidate multiple servers into one physical host, reducing need for additional hardware and saving on energy and maintenance costs. Virtualization also allows organizations to quickly and easily create and manage virtual machines, enabling them to scale up and down as needed, and respond to changing business requirements. With increasing popularity of virtualization, businesses are faced with challenge of choosing right virtualization technology that best suits their needs. There are several virtualization technologies available ... Read More

Linux Kernel Versions 32-Bit vs 64-Bit

Satish Kumar
Updated on 23-Mar-2023 10:28:16

1K+ Views

Introduction Linux is an open-source operating system that is widely used in servers, supercomputers, and embedded systems. kernel is core component of Linux, which controls all resources and services of system. Linux kernel comes in two versions, 32-bit and 64-bit, which have some significant differences. In this article, we will explore differences between these two versions and their impact on performance and capabilities of Linux. 32-Bit vs 64-Bit Architecture The terms 32-bit and 64-bit architecture refer to way that processors handle data. In a 32-bit architecture, processor can handle data in 32-bit chunks, while in a 64-bit architecture, processor can ... Read More

Generating an SHA-256 Hash From Command Line

Satish Kumar
Updated on 14-Mar-2023 16:31:49

10K+ Views

As technology becomes increasingly integrated into our daily lives, security concerns continue to grow. It's more important than ever to ensure that our data is secure and protected from cybercriminals. One way to help protect data is to use a hash function. SHA-256 is one such hash function that can be used to create a unique digital fingerprint for data. In this article, we'll explore how to generate an SHA-256 hash from command line. What is SHA-256? SHA-256 is a cryptographic hash function that takes input data and produces a fixed-length output, or hash, of 256 bits. function is designed ... Read More

Introduction to Iptables

Satish Kumar
Updated on 14-Mar-2023 16:31:19

4K+ Views

Introduction to iptables Iptables is a Linux-based firewall application that controls incoming and outgoing traffic. It is a powerful tool that can be used to secure a server, limit access to specific applications or services, and mitigate risk of malicious attacks. This article will provide an introduction to iptables, its purpose, and its basic usage. What is iptables? Iptables is a firewall application that works with Linux kernel. It controls incoming and outgoing traffic and provides a mechanism to filter, block, or allow traffic based on various criteria, such as port number, IP address, protocol, and more. Iptables is designed ... Read More

Advertisements