Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Linux Articles
Page 19 of 134
How to Change Runlevels (targets) in SystemD?
SystemD is a system and service manager for Linux operating systems that manages the boot process, system services, and provides a centralized way to manage processes. One of its key features is the use of targets (the modern equivalent of runlevels) to define different system states and control which services run during startup and operation. Understanding how to change targets is essential for Linux administrators as it allows precise control over system behavior, resource usage, and available services based on specific operational requirements. Understanding SystemD Targets SystemD replaces traditional Unix runlevels with targets, which are more flexible ...
Read MoreHow To Change Speed & Duplex of Ethernet Card in Linux with Ethtool Command?
Ethernet cards, also known as network interface cards (NICs), are hardware components that allow computers to connect to networks. These cards enable data transmission between devices by converting digital signals from a computer into electrical signals that can be sent over the network's physical medium, such as copper wires or fiber-optic cables. Ethernet cards are essential for accessing the internet, file sharing and printing in a local network. Understanding Ethtool Command Ethtool is a Linux command-line utility that allows users to query and change various network interface card (NIC) settings. It provides detailed information about the NICs installed ...
Read MoreHow to Change SSH Port in Linux?
Secure Shell (SSH) is a network protocol that provides encrypted communication over an insecure network. By default, SSH listens on port 22, which is well-known and frequently targeted by attackers. Changing the SSH port to a non-standard number adds an extra layer of security through security through obscurity. Checking Current SSH Port Before changing the SSH port, verify which port your SSH service is currently using. Use the following command to check the current configuration: sshd -T | grep port This command will display output similar to: port 22 addressfamily any listenaddress ...
Read MoreHow to Check and Install Updates On CentOS and RHEL?
Keeping your system up to date is essential for maintaining the security, stability, and performance of your CentOS or RHEL server. Cybercriminals constantly look for vulnerabilities in operating systems and software, making regular updates crucial to prevent data breaches and security exploits. Software updates also include bug fixes and enhancements that improve functionality and compatibility. This guide covers how to check for and install updates on CentOS and RHEL using both Yum Package Manager (legacy) and DNF Package Manager (modern). You'll also learn how to set up automatic updates to streamline maintenance. Checking for Updates Before installing ...
Read MoreHow To Check If File or Directory Exists in Bash?
In Bash scripting, checking file or directory existence is a fundamental task for system administrators and developers. Bash provides several built-in commands and operators to test whether files and directories exist before performing operations on them, helping prevent errors and ensuring script reliability. Using the Test Command The test command is a built-in Bash utility that evaluates conditions and returns an exit status of 0 (true) or 1 (false). It offers various options for checking file and directory existence. Basic Test Options Option Description Usage -e Checks if file ...
Read MoreHow to Check Integrity of File and Directory Using AIDE in Linux?
AIDE (Advanced Intrusion Detection Environment) is a file and directory integrity checker for Linux systems. It creates a database snapshot of your system's files and directories, then uses this baseline to detect unauthorized changes, tampering, or corruption. AIDE monitors file attributes including permissions, ownership, size, timestamps, and cryptographic checksums. File integrity checking is crucial for system security, data protection, and compliance requirements. When files are modified without authorization, it can indicate security breaches, malware infections, or system corruption that requires immediate attention. Installing AIDE on Linux System Requirements Before installing AIDE, ensure your system meets these ...
Read MoreEasyTAG: A Tool for Viewing and Editing Tags in Audio and Video Files
EasyTAG is an open-source, cross-platform audio and video file tag editor that allows users to view and modify metadata information embedded in media files. Released under the GNU General Public License, this powerful tool supports a wide range of audio and video formats including MP3, MP4, FLAC, Ogg Vorbis, and many others. Originally designed to help organize music collections, EasyTAG has evolved into a comprehensive metadata management solution. It provides an intuitive interface for editing tags such as artist names, album titles, track numbers, genres, and even album artwork. Key Features Supports multiple media formats: MP3, ...
Read Morertop - An Interactive Tool to Monitor Remote Linux Server Over SSH
rtop is an interactive command-line tool designed for monitoring remote Linux servers over SSH connections. It provides real-time insights into critical server metrics including CPU usage, memory consumption, network traffic, and disk utilization. The tool allows system administrators to actively monitor server performance, quickly identify bottlenecks, and address potential issues before they impact system stability. How rtop Works rtop establishes an SSH connection to remote Linux servers and continuously collects system metrics. The tool presents data through an interactive interface that allows administrators to navigate between different metrics, sort information, and drill down into process-specific details. This real-time ...
Read MoreRequirements of Linux System Administrator
Linux is a type of operating system that is used in many computers, acting as a common platform between hardware and software applications. It is implemented not only in servers and workstations but also in mobile devices, embedded systems, and cloud infrastructure. Linux OS can be installed and used for free as it comes under open source licensing. The Linux System Administrator is a critical position in Information Technology (IT) organizations, responsible for maintaining, configuring, and securing Linux-based systems that form the backbone of modern enterprise infrastructure. Linux System Administrator Role A Linux System Administrator is a specialized ...
Read MorePuppy Linux Operating System
Puppy Linux is a lightweight version of the Linux operating system designed for small, portable, and versatile usage on home user systems. Developed by Barry Kauler in June 2003, it prioritizes minimal resource usage while providing a complete desktop experience. The entire system operates within 300MB for 32-bit and 600MB for 64-bit versions, making it ideal for older hardware and resource-constrained environments. Features Puppy Linux offers exceptional functionality in a compact package − Ultra-compact size − Around 300MB or less, installable from USB, CD, SD card, or other media Ready-to-use applications − Includes essential tools like ...
Read More