Operating System Articles

Page 6 of 171

How to Override Entrypoint Using Docker Run?

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 12K+ Views

In the world of containerization, Docker has become a popular choice for packaging and deploying applications. One of the key aspects of Docker containers is the entrypoint, which defines the default command that is executed when the container starts. However, there are scenarios where you may need to override the entrypoint and execute a different command inside the container. This flexibility allows you to customize the container behavior based on your specific requirements. In this article, we will explore the concept of overriding the entrypoint using the docker run command. We will delve into the reasons why you might ...

Read More

Difference Between a Tethered and Untethered Jailbreak

Md. Sajid
Md. Sajid
Updated on 17-Mar-2026 2K+ Views

Jailbreaking is the process of removing software restrictions from Apple iOS devices such as iPhones, iPads, and iPod Touches. This process grants users root access to the device's file system, allowing installation of applications, customizations, and themes not available through the official Apple App Store. The two primary types of jailbreaks are tethered and untethered, each with distinct characteristics and limitations. What is Tethered Jailbreak? A tethered jailbreak requires the device to be connected to a computer every time it boots or reboots to maintain the jailbroken state. If the device loses power or restarts, it will boot ...

Read More

Graylog - Industry Leading Log Management for Linux

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 600 Views

In today's world, businesses and organizations generate massive amounts of data. One of the most important sources of data in a software-based organization is log files. These files contain valuable information about user behavior, system performance, security events, and more. However, managing and analyzing large volumes of log data can be challenging without the right tools and techniques. What is Graylog? Graylog is an open-source log management tool designed to help organizations collect, process, and analyze large volumes of log data from various sources. It is built on top of Elasticsearch, MongoDB, and other open-source technologies to provide ...

Read More

Guake - A Dropdown Linux Terminal for Gnome Desktops

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 618 Views

As a Linux user, having a reliable and efficient terminal emulator is essential for daily work. One popular option for Gnome desktops is Guake, a dropdown terminal that can be accessed with just a keyboard shortcut or hotkey. In this article, we will explore the many features and benefits of using Guake as well as its installation and configuration. Overview of Guake Features Guake is a feature-rich terminal emulator that offers many benefits to users. Its dropdown terminal functionality allows users to quickly access the terminal by pressing a hotkey, without disrupting their workflow. This feature is especially ...

Read More

Gulp - A Toolkit for Automating Painful Tasks in Development

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 249 Views

In the world of web development, developers often face repetitive tasks that can be mundane and time-consuming. These tasks include minifying JavaScript files, optimizing images for the web, compiling Sass or Less into CSS, and many others. This is where Gulp comes in. Gulp is a toolkit that helps automate these tedious tasks with ease. It is a popular open-source JavaScript-based task runner that allows developers to create automated workflows for their projects. Its simplicity in usage and flexibility in configuration makes it a great choice for any project. What is Gulp? Gulp is a task runner ...

Read More

How I Switched from Windows 10 to Linux Mint?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 864 Views

As an avid computer user, I have always believed that it is important to stay up-to-date with the latest technology. For years, I had been using the widely popular operating system, Windows 10. However, over time, I began to experience a range of issues with Windows that left me feeling frustrated and unsatisfied with my computing experience. Understanding the Differences Between Windows 10 and Linux Mint Overview of Windows 10 Operating System Windows 10 is a widely used operating system developed by Microsoft. It has a graphical user interface that allows users to interact with the computer ...

Read More

How to Change Kernel Runtime Parameters in a Persistent and Non-Persistent Way?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 798 Views

Kernel runtime parameters are settings that control the behavior of the Linux kernel on your system. These parameters can affect a wide range of system functions, such as memory allocation, network performance, and CPU scheduling. Understanding how to change these parameters is crucial for optimizing system performance and troubleshooting issues that may arise. There are two main ways to change kernel runtime parameters: non-persistent changes and persistent changes. Non-persistent changes modify the kernel's behavior temporarily, lasting only until you reboot your system. Persistent changes, on the other hand, modify the kernel's behavior permanently and persist across reboots. ...

Read More

How to Change User Password in Ubuntu?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 4K+ Views

If you are a Linux user, there is no doubt that you have heard of Ubuntu OS. Ubuntu is an open-source operating system based on the Debian architecture and is one of the most popular distributions of Linux. Its user-friendly interface and versatile nature makes it a great operating system for both personal and professional use. As with any operating system, password security in Ubuntu is of utmost importance. With cyberattacks increasing day by day, secure passwords are essential to keep your information safe from unauthorized access. This guide aims to simplify the process of changing your user ...

Read More

How to Check and Patch Meltdown CPU Vulnerability in Linux?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 645 Views

Meltdown is a critical hardware vulnerability discovered in early 2018 that affects Intel processors and some ARM chips. This security flaw exploits speculative execution, allowing attackers to read sensitive data like passwords, encryption keys, and login credentials from kernel memory. Understanding and patching this vulnerability is essential for maintaining system security. Understanding the Meltdown Vulnerability Meltdown exploits a fundamental CPU optimization called speculative execution, where processors execute instructions before confirming they're needed to improve performance. The vulnerability allows unprivileged processes to access privileged kernel memory that should be protected. Meltdown Attack Process ...

Read More

How Linux Uses Sockets?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 3K+ Views

Linux is an open-source operating system that has gained immense popularity for its stability and security. It is widely used in various fields such as web servers, embedded systems, and supercomputers. One of the key aspects of Linux is its efficient usage of sockets for interprocess communication. Sockets provide a flexible way to establish communication channels between different processes running on the same or different machines connected over a network. What are Sockets? Sockets are a fundamental concept in Linux networking, allowing communication between processes on different computers over a network. In simple terms, a socket is ...

Read More
Showing 51–60 of 1,707 articles
« Prev 1 4 5 6 7 8 171 Next »
Advertisements