
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1466 Articles for Linux

2K+ Views
Creating and executing a .jar file in Linux is a simple process that combines the compilation of Java source code and the packaging of class files and resources into a single file. With the terminal, you can easily compile your code, create a .jar file, make it executable, and run your Java application with ease. The JAR format, also known as the Java ARchive, offers a flexible and efficient way to package Java class files, resources, and metadata into a single, platform-agnostic file. The purpose of this format is to simplify the distribution and deployment process for Java runtimes, while ... Read More

8K+ Views
To create a bootable USB drive from an ISO file in Linux, we find it useful when installing a new operating system or running a live environment without affecting my existing system. It's also an excellent option when my computer lacks a CD/DVD drive, as USB drives are more common and easier to use. To start the process, we use the "lsblk" command to find the device name of the USB drive and then download the ISO file. we then mount the ISO file and use the mount and dd commands to copy its contents to the USB drive. When ... Read More

12K+ Views
The robust command line interface (CLI) of Linux is renowned for enabling users to complete tasks quickly and effectively. Copying file content directly from the terminal is one of the many tasks Linux users frequently carry out. This article explores the subtleties of copying file content in Linux, explaining various approaches and providing detailed step-by-step instructions. Readers will gain a profound understanding of each strategy by carefully examining these approaches. Let's set out on this instructive journey to discover the complexities of copying file content in Linux. Method 1: Using the 'cat' Command In Linux, the 'cat' command is a ... Read More

3K+ Views
In today's digital age, images play a vital role in websites and various digital projects. But, the larger the image size, the longer it takes to load, leading to a poor user experience. You probably want to know the solution to this. Fortunately, Google has developed the WebP image format, which offers superior compression and quality compared to traditional image formats like JPEG and PNG. In this article, we will delve into how you can convert images to the WebP format on Linux using the WebP tools. By converting your images to WebP format, you can significantly reduce their file ... Read More

627 Views
As Linux users and administrators, we are responsible for managing services on remote Linux servers, which could include web servers like Apache or Nginx, or database servers like MySQL or PostgreSQL. To effectively manage these services, we need to have a strong understanding of the underlying system and service manager for Linux - systemd. Systemd is a robust and feature-rich system and service manager designed for Linux-based operating systems. It takes care of managing the initialization and termination of services, tracks system processes, and oversees system resources. It is widely acquired as the default system and service manager in many ... Read More

614 Views
Process scheduling plays a crucial role in the efficient functioning of operating systems. Within the realm of process scheduling, understanding job and process status is essential for effective management and optimization. In this article, we will delve into the concept of process scheduler, explore job and process status, and examine their significance in operating systems. As computers execute multiple tasks simultaneously, a process scheduler ensures fair allocation of system resources and efficient execution of processes. Job and process status are integral components of the process scheduling mechanism, providing insights into the progress and state of running processes. Understanding Process Scheduler ... Read More

3K+ Views
The proper management and control of processes are integral components of efficient system functionality. In this piece. We will examine two essential facets: the process table and Process Control Block (PCB). We will delve into their definitions, purposes, and significance in operating systems. The Process Table Definition and Purpose Operating systems utilize what's known as a "process table" as means to accurately monitor active processes within their infrastructure. Such tables are responsible for compiling vital information concerning every single running program/system component under supervision from an OS. Thus keeping an exhaustive inventory about these details aids in controlling/dispatching them smoothly ... Read More

3K+ Views
If you are a Linux user and wish to connect to a Wi-Fi network from a terminal. Although it may seem scary, it is actually a simple process using the Nmcli command. In this article, I will introduce you to the steps of connecting Wi-Fi from a Linux terminal using Nmcli commands in a simple and easy-to-understand way. So let’s get started! First, if we want to check the name of our network device we can simply do that by running the following command − $ iw dev You’ll get the output kind of this by running the command − ... Read More

4K+ Views
Secure remote access is essential for both organizations and individuals in the connected world of today. For secure network communication and remote system administration, SSH (Secure Shell) has gained popularity. It is crucial to understand that SSH servers can be subject to brute-force attacks that aim to jeopardize their security. This article gives a general overview of brute-forcing SSH in Kali Linux, a well-known system for security analysis and penetration testing. Network administrators can strengthen their defenses and guarantee the integrity of their SSH servers by comprehending the mechanics of these attacks, taking ethical considerations into account, and putting mitigation ... Read More

4K+ Views
USB storage devices have become ubiquitous in our technology-driven world, but they also pose a significant security threat to organizations. Attackers can exploit these devices to introduce malware, steal sensitive data, or gain unauthorized access to a network. To protect Linux servers against such attacks, administrators can take proactive measures by blocking USB storage devices. This article will delve into the various ways to accomplish this, including the benefits of each approach and the necessary steps to implement them. After reading this article, readers will be equipped with the knowledge to disable USB storage devices and secure their Linux servers. ... Read More