Linux Articles

Page 2 of 134

Tracking Down Wasted Disk Space in Linux using Agedu

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 279 Views

If you're a Linux user, managing disk space is essential to system maintenance. However, identifying the files and directories that are taking up larger amounts of space can be a stressful task. That's where Agedu comes in. Agedu is an important tool that can help you track down wasted disk space on your Linux system. In this article, you'll be informed through installing and using Agedu to identify the directories and files that are taking up the most space on your Linux system. By the end of this article, you will be able to optimize your disk space by ...

Read More

Difference between Linux and Chrome OS

Pradeep Kumar
Pradeep Kumar
Updated on 17-Mar-2026 3K+ Views

Linux and Chrome OS are two popular operating systems that serve different computing needs. While both are built on the Linux kernel, they differ significantly in their design philosophy, target audience, and functionality. This tutorial examines the key differences between Linux and Chrome OS in terms of architecture, user interface, software availability, device compatibility, and security models. What is Linux? Linux is an open-source, Unix-like operating system kernel developed by Linus Torvalds in 1991. It serves as the foundation for numerous Linux distributions and has become one of the most widely used operating systems globally. Linux ...

Read More

How Are Linux PIDs Generated?

Kunal Verma
Kunal Verma
Updated on 17-Mar-2026 428 Views

When a Linux command is executed, the system creates a separate process to carry out that command. Each process is assigned a unique Process ID (PID), which the operating system uses to track and manage the process throughout its lifecycle. Note − Linux commands are case-sensitive. Process Table The process table is a data structure stored in the system's RAM that contains information about all processes currently managed by the operating system. Each entry in the process table stores comprehensive details about a specific process. Key information stored in the process table includes − ...

Read More

Setting Up LDAP-based Authentication in RHEL 8

Ayush Singh
Ayush Singh
Updated on 17-Mar-2026 8K+ Views

To configure LDAP-based authentication in RHEL 8, install required packages, adjust configuration files, and configure LDAP server details in sssd.conf. To apply the modifications, restart the sssd service after that. Finally, login using an LDAP user account to check the LDAP authentication. User authentication across several systems is made simpler with LDAP-based authentication, which offers a centralised user management solution. What is LDAP? LDAP (Lightweight Directory Access Protocol) is a standardized protocol used in RHEL 8 Linux to configure directory-based authentication. It provides a defined method for accessing and managing directory information, including user accounts and their attributes, ...

Read More

How to Monitor Progress of (Copy_Backup_Compress) Data using pv Command?

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 433 Views

Monitoring the progress of data operations, such as copying, backing up, or compressing files, is essential for keeping track of their status and ensuring their successful completion. One powerful tool that can help in this regard is the pv command. Short for "pipe viewer, " the pv command provides real-time monitoring of data as it flows through a pipeline. With its simplicity and effectiveness, the pv command can be a valuable addition to your toolkit for managing data tasks. In this guide, we will explore how to use the pv command to monitor the progress of copy, backup, and ...

Read More

How to Monitor Website and Application with Uptime Kuma?

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 2K+ Views

Monitoring the availability and performance of your website or application is crucial for ensuring a seamless user experience. Downtime and performance issues can lead to dissatisfied users and potential revenue loss. That's where Uptime Kuma comes in. Uptime Kuma is an open-source monitoring tool that allows you to track the uptime, response time, and other important metrics of your websites and applications. In this article, we will explore the installation, configuration, and usage of Uptime Kuma to effectively monitor your websites and applications. We'll cover topics such as adding monitors, customizing alerts and notifications, analyzing the Uptime Kuma dashboard ...

Read More

How to Move Home Directory to New Partition or Disk in Linux?

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 1K+ Views

In the Linux operating system, the home directory holds user-specific files, configurations, and personal data. As your usage grows, you might find the need to move your home directory to a new partition or disk to accommodate more space or optimize system performance. This can be a valuable solution, especially when dealing with limited disk space or utilizing separate storage devices. This article explores the process of moving the home directory to a new partition or disk in Linux. We'll cover the necessary steps to prepare the new partition, discuss the home directory structure, and provide a detailed guide ...

Read More

How to Obtain Accurate Server Time in CentOS?

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 1K+ Views

Accurate server time is crucial for various aspects of system administration, including synchronization between distributed systems, logging, security measures, and troubleshooting. In CentOS, a popular Linux distribution, there are several methods to obtain accurate server time. In this article, we will explore different approaches to ensure precise timekeeping in CentOS. We'll begin by checking the system time and verifying the time zone settings. Then, we'll dive into two common methods: using the Network Time Protocol (NTP) and the Chrony time daemon. Additionally, we'll discuss the hardware clock and its significance in maintaining accurate time. Checking System Time ...

Read More

How to Password Protect Web Directories in Nginx?

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 1K+ Views

In today's digital landscape, ensuring the security of web applications and sensitive data is of paramount importance. One effective way to enhance the security of your web directories is by implementing password protection. With password protection in place, you can restrict access to authorized users and safeguard your confidential information. Nginx, a popular web server and reverse proxy, offers robust capabilities for securing web directories. By setting up basic authentication, you can prompt users to enter a username and password before accessing specific directories on your website. In this tutorial, we will walk you through the process of ...

Read More

How to Perform Canary Deployments with Istio?

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 297 Views

Canary deployments have become a vital strategy for achieving seamless software updates while minimizing risks. By gradually rolling out new versions to a subset of users, canary deployments enable teams to validate changes in real-world scenarios before reaching the entire user base. To effectively manage canary deployments in a Kubernetes environment, Istio emerges as a powerful tool. In this guide, we will explore the concept of canary deployments and how Istio, a leading service mesh platform, can facilitate their implementation. We'll provide a step-by-step guide, complete with code examples, to help you harness the full potential of Istio for ...

Read More
Showing 11–20 of 1,338 articles
« Prev 1 2 3 4 5 134 Next »
Advertisements