Linux Articles

Page 34 of 134

How to Develop Own Custom Linux Distribution From Scratch?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

Linux is an open-source operating system that is widely used by developers, system administrators, and individuals who prefer a non-proprietary operating system. A Linux distribution, often simply called a "distro, " is a customized version of the Linux operating system that includes different software packages and configurations to fit specific needs. There are hundreds of Linux distributions available, ranging from popular ones like Ubuntu and Fedora to specialized ones like Kali Linux for cybersecurity professionals. Creating your own custom Linux distribution allows you to tailor the operating system to your exact requirements, removing unnecessary components and adding specialized tools. ...

Read More

How to Configure Network Static IP Address in Ubuntu 18.04?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

The Internet Protocol (IP) address is a crucial component of computer networking as it uniquely identifies each device connected to a network. By default, most network interfaces are configured to obtain an IP address dynamically from a router or DHCP server. However, in some cases, it is necessary to configure a static IP address. A static IP address is an IP address that is manually assigned to a device and does not change over time unless manually reconfigured. In this article, we will discuss how to configure a static IP address on Ubuntu 18.04 and why it's important in ...

Read More

How to Configure PAM to Audit Logging Shell User Activity?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 948 Views

In today's digital age, security is of utmost importance. The rise of cyber threats and data breaches has shown that no system is completely safe. System administrators and IT professionals must take proactive measures to protect their systems and data. One such measure is the use of Pluggable Authentication Modules (PAM) for user authentication. PAM is a powerful tool that allows system administrators to customize the authentication process for their systems. It enables the use of multiple authentication methods, such as passwords, tokens, and biometrics, among others. This flexibility makes it easier for administrators to manage access controls and ...

Read More

How to Configure Postfix and Dovecot with Virtual Domain Users in Linux?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 2K+ Views

Configuring Postfix and Dovecot with virtual domain users is an essential process for anyone running a Linux-based email server. These two software applications work together to handle incoming and outgoing emails. Postfix is the mail transfer agent (MTA) responsible for routing and delivering email messages, while Dovecot is the mail delivery agent (MDA) that delivers incoming emails to users' mailboxes and allows clients to retrieve them. This guide provides a step-by-step approach to configure both services for virtual domain users, allowing you to host multiple email domains on a single server without creating system users for each email account. ...

Read More

Copying SSH Keys to different Linux Machine

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 747 Views

When working with multiple Linux machines, you often need to copy your SSH keys between systems to enable password-less authentication. This process involves securely transferring your public key from one machine to another and properly configuring the target machine to accept your key for authentication. SSH keys consist of a private key (kept secret on your local machine) and a public key (shared with remote machines). The public key is added to the target machine's authorized_keys file, allowing secure authentication without passwords. SSH Key Structure On your local machine, SSH keys are stored in the .ssh directory ...

Read More

Find last Directory or file from a given path

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 885 Views

Extracting the last directory or file name from a given path is a common task in shell scripting and Linux command-line operations. For example, from the path /tmp/dir/target, we want to extract target as the final component. While this seems straightforward, there are several edge cases that can cause simple solutions to fail, such as trailing slashes, root directory paths, and filenames containing spaces. Common Solutions Since Linux filesystems use forward slashes (/) as path separators and don't allow slashes in filenames, we can treat the path as slash-separated components and extract the last non-empty element. ...

Read More

Delete empty files and directories in Linux

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 9K+ Views

Empty files and directories in Linux systems don't consume significant disk space, but removing them periodically helps maintain system cleanliness and organization. This tutorial covers various methods to delete empty files and directories using the powerful find command in Linux systems. Delete Empty Files in a Directory The find command with specific options can locate and remove all empty files in a directory structure. The basic syntax combines type filtering, empty file detection, and deletion in one command. find . -type f -empty -print -delete Let's examine this command with a practical example. Consider ...

Read More

How To Work With Ansible Variables And Facts?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 637 Views

Ansible is a widely-used open-source tool that helps in automating software provisioning, configuration management, and application deployment. One of its powerful features is the ability to use variables and facts, which can simplify your playbooks and tasks, and allow you to design more dynamic, flexible, and reusable automation scripts. In this article, we'll dive into how to work with Ansible variables and facts, showcasing several examples and their corresponding output. Understanding Ansible Variables Variables in Ansible allow for the storage and manipulation of values, which can be utilized across multiple tasks or even different playbooks. Variables can ...

Read More

Avoiding unwanted directory while using zip

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 304 Views

ZIP files are one of the most widely supported compression formats, especially when sharing files across different operating systems like Linux, Windows, and Mac. However, when creating ZIP archives from the command line, we often encounter the problem of unwanted directory structures that make the extracted files difficult to navigate. This article explores techniques to create clean ZIP archives without unnecessary parent directories, using Linux command-line tools and bash built-in commands like pushd and popd. The Problem with Full Path Compression When using the zip command with the -r (recursive) option, the entire directory path gets included ...

Read More

Implement shell file protection in Linux

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 494 Views

Shell file protection in Linux provides multiple layers of security to prevent accidental file overwrites and unauthorized access. This includes both filesystem permissions and built-in shell safeguards like the noclobber option that prevents redirection operators from overwriting existing files. Besides the Linux file permission mechanisms that help us keep our files safe from misuse, most Linux shells have built-in safeguards against accidental file overwrite. We'll cover the key protection mechanisms available in common shells. Protecting Files With noclobber All POSIX shell implementations support the noclobber option. When enabled, the shell prevents output redirection operators from overwriting existing ...

Read More
Showing 331–340 of 1,337 articles
« Prev 1 32 33 34 35 36 134 Next »
Advertisements