Linux Articles

Page 19 of 134

How to Change Runlevels (targets) in SystemD?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 2K+ Views

SystemD is a system and service manager for Linux operating systems that manages the boot process, system services, and provides a centralized way to manage processes. One of its key features is the use of targets (the modern equivalent of runlevels) to define different system states and control which services run during startup and operation. Understanding how to change targets is essential for Linux administrators as it allows precise control over system behavior, resource usage, and available services based on specific operational requirements. Understanding SystemD Targets SystemD replaces traditional Unix runlevels with targets, which are more flexible ...

Read More

How To Change Speed & Duplex of Ethernet Card in Linux with Ethtool Command?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 7K+ Views

Ethernet cards, also known as network interface cards (NICs), are hardware components that allow computers to connect to networks. These cards enable data transmission between devices by converting digital signals from a computer into electrical signals that can be sent over the network's physical medium, such as copper wires or fiber-optic cables. Ethernet cards are essential for accessing the internet, file sharing and printing in a local network. Understanding Ethtool Command Ethtool is a Linux command-line utility that allows users to query and change various network interface card (NIC) settings. It provides detailed information about the NICs installed ...

Read More

How to Change SSH Port in Linux?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 779 Views

Secure Shell (SSH) is a network protocol that provides encrypted communication over an insecure network. By default, SSH listens on port 22, which is well-known and frequently targeted by attackers. Changing the SSH port to a non-standard number adds an extra layer of security through security through obscurity. Checking Current SSH Port Before changing the SSH port, verify which port your SSH service is currently using. Use the following command to check the current configuration: sshd -T | grep port This command will display output similar to: port 22 addressfamily any listenaddress ...

Read More

How to Check and Install Updates On CentOS and RHEL?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 3K+ Views

Keeping your system up to date is essential for maintaining the security, stability, and performance of your CentOS or RHEL server. Cybercriminals constantly look for vulnerabilities in operating systems and software, making regular updates crucial to prevent data breaches and security exploits. Software updates also include bug fixes and enhancements that improve functionality and compatibility. This guide covers how to check for and install updates on CentOS and RHEL using both Yum Package Manager (legacy) and DNF Package Manager (modern). You'll also learn how to set up automatic updates to streamline maintenance. Checking for Updates Before installing ...

Read More

How To Check If File or Directory Exists in Bash?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 5K+ Views

In Bash scripting, checking file or directory existence is a fundamental task for system administrators and developers. Bash provides several built-in commands and operators to test whether files and directories exist before performing operations on them, helping prevent errors and ensuring script reliability. Using the Test Command The test command is a built-in Bash utility that evaluates conditions and returns an exit status of 0 (true) or 1 (false). It offers various options for checking file and directory existence. Basic Test Options Option Description Usage -e Checks if file ...

Read More

How to Check Integrity of File and Directory Using AIDE in Linux?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

AIDE (Advanced Intrusion Detection Environment) is a file and directory integrity checker for Linux systems. It creates a database snapshot of your system's files and directories, then uses this baseline to detect unauthorized changes, tampering, or corruption. AIDE monitors file attributes including permissions, ownership, size, timestamps, and cryptographic checksums. File integrity checking is crucial for system security, data protection, and compliance requirements. When files are modified without authorization, it can indicate security breaches, malware infections, or system corruption that requires immediate attention. Installing AIDE on Linux System Requirements Before installing AIDE, ensure your system meets these ...

Read More

EasyTAG: A Tool for Viewing and Editing Tags in Audio and Video Files

Prateek Jangid
Prateek Jangid
Updated on 17-Mar-2026 1K+ Views

EasyTAG is an open-source, cross-platform audio and video file tag editor that allows users to view and modify metadata information embedded in media files. Released under the GNU General Public License, this powerful tool supports a wide range of audio and video formats including MP3, MP4, FLAC, Ogg Vorbis, and many others. Originally designed to help organize music collections, EasyTAG has evolved into a comprehensive metadata management solution. It provides an intuitive interface for editing tags such as artist names, album titles, track numbers, genres, and even album artwork. Key Features Supports multiple media formats: MP3, ...

Read More

rtop - An Interactive Tool to Monitor Remote Linux Server Over SSH

Ayush Singh
Ayush Singh
Updated on 17-Mar-2026 896 Views

rtop is an interactive command-line tool designed for monitoring remote Linux servers over SSH connections. It provides real-time insights into critical server metrics including CPU usage, memory consumption, network traffic, and disk utilization. The tool allows system administrators to actively monitor server performance, quickly identify bottlenecks, and address potential issues before they impact system stability. How rtop Works rtop establishes an SSH connection to remote Linux servers and continuously collects system metrics. The tool presents data through an interactive interface that allows administrators to navigate between different metrics, sort information, and drill down into process-specific details. This real-time ...

Read More

Requirements of Linux System Administrator

Pranavnath
Pranavnath
Updated on 17-Mar-2026 3K+ Views

Linux is a type of operating system that is used in many computers, acting as a common platform between hardware and software applications. It is implemented not only in servers and workstations but also in mobile devices, embedded systems, and cloud infrastructure. Linux OS can be installed and used for free as it comes under open source licensing. The Linux System Administrator is a critical position in Information Technology (IT) organizations, responsible for maintaining, configuring, and securing Linux-based systems that form the backbone of modern enterprise infrastructure. Linux System Administrator Role A Linux System Administrator is a specialized ...

Read More

Puppy Linux Operating System

Pranavnath
Pranavnath
Updated on 17-Mar-2026 657 Views

Puppy Linux is a lightweight version of the Linux operating system designed for small, portable, and versatile usage on home user systems. Developed by Barry Kauler in June 2003, it prioritizes minimal resource usage while providing a complete desktop experience. The entire system operates within 300MB for 32-bit and 600MB for 64-bit versions, making it ideal for older hardware and resource-constrained environments. Features Puppy Linux offers exceptional functionality in a compact package − Ultra-compact size − Around 300MB or less, installable from USB, CD, SD card, or other media Ready-to-use applications − Includes essential tools like ...

Read More
Showing 181–190 of 1,338 articles
« Prev 1 17 18 19 20 21 134 Next »
Advertisements