Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Linux Articles
Page 22 of 134
Setting Permissions with chown and chmod
When working with files and directories in Linux, it's important to understand how to set permissions. Permissions define who can access and modify files and directories on a system. The chown and chmod commands are essential tools for managing ownership and access rights. Understanding Linux File Permissions In Linux, each file and directory has three types of permissions: read (r), write (w), and execute (x). These permissions can be set for three different categories of users − owner of the file or directory, group to which the file or directory belongs, and all other users. ...
Read MoreGuide to Stream Redirections in Linux
As a Linux user, it's essential to understand the concept of stream redirections. Stream redirections allow us to manipulate and control input and output streams of Linux commands. This means we can control where standard input, output, and error streams are going to and coming from. In this article, we'll guide you through the basics of stream redirections and show you how to use them with examples. Introduction to Stream Redirections In Linux, there are three types of streams − Standard Input (stdin) − This is the input stream that allows us to send data into ...
Read MoreUsing direct IO with ecryptfs and similar stackable file systems
Encryption is the process of converting plain text into an unreadable format known as ciphertext. Encrypted text can only be read with the help of a secret key or password. In the modern era, encryption has become a very important tool for maintaining data privacy and security. ecryptfs is a popular encryption mechanism used in Linux-based operating systems. It provides a secure and transparent way to encrypt files, directories, and entire filesystems. It is a stackable filesystem, which means that it can be layered on top of other filesystems to provide encryption without modifying the underlying storage layer. ...
Read MorecURL Command Without Using Cache
cURL (Client URL) is a command-line tool that allows data to be transferred to or from a server without requiring user interaction by utilizing the supported libcurl library. cURL can also be used to troubleshoot network connections and test web services. In some cases, we may need to send requests that bypass the cache and generate a fresh response from the server. Caching can occur on the client side (browser cache) or the server side. When using the cURL command, remember that it is only an HTTP client and does not cache any requests on the client side. As ...
Read MoreHow to Add a String After Each Line in a File in Linux?
We occasionally need to make changes to files quickly, preferably from the command line. One common task is adding a string to the end of each line of a file. In this article, we'll explore several methods to accomplish this using various Linux commands. We'll use a sample file called language.txt throughout this article. Let's first create and populate this file − $ touch language.txt $ cat > language.txt Hindi English Chinese Spanish ^D Our goal is to append the phrase "is a good language to learn" to the end of each line in the ...
Read MoreInstalling and Configuring Net-SNMP for Linux
Net-SNMP is an open-source software suite that implements Simple Network Management Protocol (SNMP) for managing network devices. It provides a wide range of tools that enable network administrators to monitor and manage their systems more effectively. In this article, we will explore how to install and configure Net-SNMP on a Linux system. Prerequisites Before we begin, ensure that you have access to a Linux system with root privileges. Additionally, make sure that system has an active internet connection to download necessary software packages. Installing Net-SNMP To install Net-SNMP on a Linux system, you can use package ...
Read MoreHow to make a USB device multi-touch enabled
In recent years, touch technology has become increasingly popular, with smartphones, tablets, and laptops offering the capability to interact with devices by simply tapping or swiping the screen. However, what if you could use touch technology on your computer using a USB device? This is where the concept of multi-touch enabled USB devices comes into play. In this article, we will explain what multi-touch enabled USB devices are, how to make a USB device multi-touch enabled, and provide examples of popular multi-touch USB devices in the market. What are Multi-touch Enabled USB Devices? Multi-touch enabled USB devices are ...
Read MoreHow to encrypt a large file using openssl?
OpenSSL is a powerful cryptographic toolkit that provides various security functions including file encryption. It comes pre-installed on most Linux distributions, but can be installed via package managers if needed. This article demonstrates how to encrypt large files using OpenSSL's public-key cryptography features. Understanding Encryption Types Before diving into file encryption, it's important to understand the two main encryption approaches: Symmetric (Secret-key) encryption − Uses the same key for both encryption and decryption Asymmetric (Public-key) encryption − Uses separate keys for encryption and decryption Public-key encryption is more secure as it eliminates key-sharing concerns, ...
Read MoreMonitoring context switches in Linux
Context switching is an essential aspect of modern operating systems that enables them to efficiently manage resources. Context switching is the process of switching from one process to another in a multi-tasking environment. The operating system does this by saving the state of the current process and loading the state of the next process. Monitoring context switches in Linux is a crucial task for system administrators, developers, and users who want to optimize performance of their systems. Understanding Context Switching in Linux Context switching occurs when the operating system switches between multiple processes to give the illusion of ...
Read MoreHow to swap two files in Linux command line?
As system administrators or DevOps professionals, we often need to exchange file contents. For example, you might have a backup file /etc/passwd.backup that you want to restore to /etc/passwd, while preserving the current content by moving it to the backup file. This operation is called file swapping − exchanging the actual content of two files, not their locations. When we talk about swapping two files on Linux, we mean exchanging their content while keeping their names and locations unchanged. This tutorial demonstrates practical methods to accomplish this task using command line tools. Example Files Setup Let's create ...
Read More