Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Linux Articles
Page 2 of 134
Tracking Down Wasted Disk Space in Linux using Agedu
If you're a Linux user, managing disk space is essential to system maintenance. However, identifying the files and directories that are taking up larger amounts of space can be a stressful task. That's where Agedu comes in. Agedu is an important tool that can help you track down wasted disk space on your Linux system. In this article, you'll be informed through installing and using Agedu to identify the directories and files that are taking up the most space on your Linux system. By the end of this article, you will be able to optimize your disk space by ...
Read MoreDifference between Linux and Chrome OS
Linux and Chrome OS are two popular operating systems that serve different computing needs. While both are built on the Linux kernel, they differ significantly in their design philosophy, target audience, and functionality. This tutorial examines the key differences between Linux and Chrome OS in terms of architecture, user interface, software availability, device compatibility, and security models. What is Linux? Linux is an open-source, Unix-like operating system kernel developed by Linus Torvalds in 1991. It serves as the foundation for numerous Linux distributions and has become one of the most widely used operating systems globally. Linux ...
Read MoreHow Are Linux PIDs Generated?
When a Linux command is executed, the system creates a separate process to carry out that command. Each process is assigned a unique Process ID (PID), which the operating system uses to track and manage the process throughout its lifecycle. Note − Linux commands are case-sensitive. Process Table The process table is a data structure stored in the system's RAM that contains information about all processes currently managed by the operating system. Each entry in the process table stores comprehensive details about a specific process. Key information stored in the process table includes − ...
Read MoreSetting Up LDAP-based Authentication in RHEL 8
To configure LDAP-based authentication in RHEL 8, install required packages, adjust configuration files, and configure LDAP server details in sssd.conf. To apply the modifications, restart the sssd service after that. Finally, login using an LDAP user account to check the LDAP authentication. User authentication across several systems is made simpler with LDAP-based authentication, which offers a centralised user management solution. What is LDAP? LDAP (Lightweight Directory Access Protocol) is a standardized protocol used in RHEL 8 Linux to configure directory-based authentication. It provides a defined method for accessing and managing directory information, including user accounts and their attributes, ...
Read MoreHow to Monitor Progress of (Copy_Backup_Compress) Data using pv Command?
Monitoring the progress of data operations, such as copying, backing up, or compressing files, is essential for keeping track of their status and ensuring their successful completion. One powerful tool that can help in this regard is the pv command. Short for "pipe viewer, " the pv command provides real-time monitoring of data as it flows through a pipeline. With its simplicity and effectiveness, the pv command can be a valuable addition to your toolkit for managing data tasks. In this guide, we will explore how to use the pv command to monitor the progress of copy, backup, and ...
Read MoreHow to Monitor Website and Application with Uptime Kuma?
Monitoring the availability and performance of your website or application is crucial for ensuring a seamless user experience. Downtime and performance issues can lead to dissatisfied users and potential revenue loss. That's where Uptime Kuma comes in. Uptime Kuma is an open-source monitoring tool that allows you to track the uptime, response time, and other important metrics of your websites and applications. In this article, we will explore the installation, configuration, and usage of Uptime Kuma to effectively monitor your websites and applications. We'll cover topics such as adding monitors, customizing alerts and notifications, analyzing the Uptime Kuma dashboard ...
Read MoreHow to Move Home Directory to New Partition or Disk in Linux?
In the Linux operating system, the home directory holds user-specific files, configurations, and personal data. As your usage grows, you might find the need to move your home directory to a new partition or disk to accommodate more space or optimize system performance. This can be a valuable solution, especially when dealing with limited disk space or utilizing separate storage devices. This article explores the process of moving the home directory to a new partition or disk in Linux. We'll cover the necessary steps to prepare the new partition, discuss the home directory structure, and provide a detailed guide ...
Read MoreHow to Obtain Accurate Server Time in CentOS?
Accurate server time is crucial for various aspects of system administration, including synchronization between distributed systems, logging, security measures, and troubleshooting. In CentOS, a popular Linux distribution, there are several methods to obtain accurate server time. In this article, we will explore different approaches to ensure precise timekeeping in CentOS. We'll begin by checking the system time and verifying the time zone settings. Then, we'll dive into two common methods: using the Network Time Protocol (NTP) and the Chrony time daemon. Additionally, we'll discuss the hardware clock and its significance in maintaining accurate time. Checking System Time ...
Read MoreHow to Password Protect Web Directories in Nginx?
In today's digital landscape, ensuring the security of web applications and sensitive data is of paramount importance. One effective way to enhance the security of your web directories is by implementing password protection. With password protection in place, you can restrict access to authorized users and safeguard your confidential information. Nginx, a popular web server and reverse proxy, offers robust capabilities for securing web directories. By setting up basic authentication, you can prompt users to enter a username and password before accessing specific directories on your website. In this tutorial, we will walk you through the process of ...
Read MoreHow to Perform Canary Deployments with Istio?
Canary deployments have become a vital strategy for achieving seamless software updates while minimizing risks. By gradually rolling out new versions to a subset of users, canary deployments enable teams to validate changes in real-world scenarios before reaching the entire user base. To effectively manage canary deployments in a Kubernetes environment, Istio emerges as a powerful tool. In this guide, we will explore the concept of canary deployments and how Istio, a leading service mesh platform, can facilitate their implementation. We'll provide a step-by-step guide, complete with code examples, to help you harness the full potential of Istio for ...
Read More