Found 1436 Articles for Linux

How to Pass Command Line Arguments to Bash Script

Bamdeb Ghosh
Updated on 14-Jul-2023 17:10:29

281 Views

Introduction For Linux system administrators and developers, the ability to write Bash scripts is important. It enables us to automate routine processes and carry out difficult ones with little effort. One of the most crucial aspects of bash scripting is the ability to give information to a script as it is being executed. The ability to alter a script's behaviour without changing its code is made possible through command line parameters. In this article the usage of command line parameters in a bash script will be discussed. We will discuss some methods for handling command line arguments and give illustrations ... Read More

Linux Commands Using Secure Shell (ssh)

Bamdeb Ghosh
Updated on 14-Jul-2023 17:12:23

533 Views

Introduction There are many ways we can access or communicate between two systems [Linux to Linux, Windows to Linux] through CLI. Secure Shell (ssh) is very useful tool to access any other Linux system. If two Linux systems are connected through any network then we can use ssh to access other system. There are some basic prerequisites to avail this facility ssh client software Example: default ssh binary in Linux, putty, mobaxterm etc. ssh server running in remote Linux system. IP or host name of remote system. Let us discuss on Linux system to Linux system communication using ... Read More

How to Execute Programs From Anywhere in Linux?

Bamdeb Ghosh
Updated on 08-May-2023 11:20:45

2K+ Views

Linux is a widely used open-source operating system that offers users the flexibility to execute programs from any location on the system. Unlike other operating systems, Linux does not have fixed program directories, enabling users to access programs from anywhere. This feature is advantageous for users who require a particular program to run from multiple locations. To execute programs from anywhere in Linux, users need to set the PATH environment variable, which contains the locations where Linux searches for executable files. The directories that contain the programs in Linux include /usr/bin, /usr/local/bin, and /sbin. The /usr/bin directory contains most of ... Read More

Working with Hidden Files in Linux

Bamdeb Ghosh
Updated on 08-May-2023 11:18:32

3K+ Views

Introduction Hidden files in Linux operating system are files that are not displayed when the ls command is executed. A hidden file's name begins with a dot. Not only files, but also directories, can be hidden in Linux. Files in Linux are hidden for a variety of purposes. One of them is to prevent us from accidentally modifying the contents of these files. Another possibility is to avoid these files from being accidentally deleted. Files on shared networks may be hidden for privacy reasons. The majority of hidden files contain environment settings or data that are viewed by applications that ... Read More

Cron Job Testing and Debugging in Linux

Bamdeb Ghosh
Updated on 08-May-2023 11:14:38

423 Views

Introduction First, we need to understand what is Cron Job in Linux. Cron job is also a Linux command that is used to schedule any kind of job in future. Therefore, this can serve many purpose of user as if some specific commands have to be run after reboot of system or some specific time in a day. Now there are many challenges in cron job testing and debugging. Let us understand these in details in this article. Syntax If we want set up a cron job, then we must understand the syntax of cron job. “a b c d ... Read More

Working with the AWS CLI for EC2

Bamdeb Ghosh
Updated on 08-May-2023 11:11:36

108 Views

Among the well-known cloud computing platforms is AWS (Amazon Web Services). Elastic Compute Cloud, or AWS EC2, is a well-known Amazon service. The Amazon CLI (Command Line Interface) is a potent tool that enables users to interact with the EC2 service via the command line in order to effectively administer EC2 instances. In-depth coverage of the Amazon CLI is provided in this article, along with examples of how to carry out various EC2 operations like establishing, listing, initiating, and terminating EC2 instances. The Amazon CLI can be used by users to automate challenging tasks and simplify cloud infrastructure management. Customers ... Read More

Memory Management: Background

Diksha Patro
Updated on 04-May-2023 13:37:40

1K+ Views

Introduction Memory management is a crucial part of computer systems that deals with managing memory resources. Memory is where computers store data, instructions, and programs while they are being used. Managing memory is important for the computer system to run smoothly. In this article, we will discuss what memory management is, and its benefits and drawbacks. Memory Management Memory management is a crucial task for the operating system, as it is responsible for managing the allocation and release of memory for different applications and processes. The operating system divides memory into different areas and assigns these regions to the applications ... Read More

Memory ballooning in OS

Diksha Patro
Updated on 04-May-2023 13:36:54

341 Views

Introduction Some operating systems use memory ballooning to optimize memory usage in virtualized environments. It entails dynamically reallocating memory resources among virtual machines (VMs) based on their current requirements. In this article, we will explore what is Memory Ballooning, and its advantages and disadvantages in detail. Memory Ballooning Memory ballooning is a technique used in virtualized environments to optimize the use of memory resources. It allows the operating system to reclaim unused memory from one virtual machine and allocate it to another that requires it. This helps to prevent resource waste and improves overall performance. Memory ballooning is achieved through ... Read More

Memory Allocation Techniques | Mapping Virtual Addresses to Physical Addresses

Diksha Patro
Updated on 04-May-2023 13:34:58

1K+ Views

Introduction In computer science and operating systems, memory allocation techniques are used to allocate memory to programs and processes. The mapping of virtual addresses to physical addresses is an important aspect of memory allocation because it allows programs to access the memory they require to run. Mapping Virtual Addresses to Physical Addresses Virtual addresses are used by programs to access memory, while physical addresses are the actual locations in RAM where data is stored.Memory allocation techniques manage the mapping of virtual addresses to physical addresses using different methods. Methods of Mapping Virtual Addresses to Physical Addresses There are three common ... Read More

Mechanism for building Distributed file system

Diksha Patro
Updated on 04-May-2023 12:43:21

767 Views

Multiple clients can access and share files stored on various servers through a distributed file system (DFS), which is a type of file system. File servers, file access protocols, metadata servers, directory services, replication and caching, and security measures are just a few of the crucial parts that go into creating a DFS. Using many protocols, including NFS, SMB, and FTP, file servers store the data and make them accessible to clients. Directory services offer a directory structure for the files in the DFS, while metadata servers manage the metadata for the files. Performance and dependability are frequently enhanced by ... Read More

Advertisements