Found 1466 Articles for Linux

A Guide to Yum and Apt on Linux

Bamdeb Ghosh
Updated on 08-May-2023 11:35:19

5K+ Views

Introduction An open-source environment is made available to users of the well-known operating system Linux so they can do a range of jobs. Two of the most popular package managers are Yum and Apt, and package management is crucial in Linux. Users can easily install, update, and uninstall software packages from their systems using any package management. Yum can be found on Red Hat-based systems like CentOS and Fedora, whereas Apt may be found on Debian-based systems like Ubuntu. In this content, we'll look at two tools for managing packages on Linux: Yum and Apt. Learn about their purposes, results, ... Read More

How to Mount and Unmount Filesystems in Linux?

Bamdeb Ghosh
Updated on 08-May-2023 11:33:30

6K+ Views

Introduction In Linux, everything (picture, binary file, text file, directory etc.) is treated as file. It is important to know how to organize and access files in a better way. Mount and umount commands are very handy in this case. In this article, we will learn these two commands. In short, using mount command we can mount a file system into a directory and using umount command we can umount the same file system from that directory. These can be done for hard disk and USB drive also. We have remember that all mount and umount commands works in “sudo” ... Read More

Linux Commands Using Secure Shell (ssh)

Bamdeb Ghosh
Updated on 14-Jul-2023 17:12:23

1K+ Views

Introduction There are many ways we can access or communicate between two systems [Linux to Linux, Windows to Linux] through CLI. Secure Shell (ssh) is very useful tool to access any other Linux system. If two Linux systems are connected through any network then we can use ssh to access other system. There are some basic prerequisites to avail this facility ssh client software Example: default ssh binary in Linux, putty, mobaxterm etc. ssh server running in remote Linux system. IP or host name of remote system. Let us discuss on Linux system to Linux system communication using ... Read More

How to Execute Programs From Anywhere in Linux?

Bamdeb Ghosh
Updated on 08-May-2023 11:20:45

3K+ Views

Linux is a widely used open-source operating system that offers users the flexibility to execute programs from any location on the system. Unlike other operating systems, Linux does not have fixed program directories, enabling users to access programs from anywhere. This feature is advantageous for users who require a particular program to run from multiple locations. To execute programs from anywhere in Linux, users need to set the PATH environment variable, which contains the locations where Linux searches for executable files. The directories that contain the programs in Linux include /usr/bin, /usr/local/bin, and /sbin. The /usr/bin directory contains most of ... Read More

Working with Hidden Files in Linux

Bamdeb Ghosh
Updated on 08-May-2023 11:18:32

6K+ Views

Introduction Hidden files in Linux operating system are files that are not displayed when the ls command is executed. A hidden file's name begins with a dot. Not only files, but also directories, can be hidden in Linux. Files in Linux are hidden for a variety of purposes. One of them is to prevent us from accidentally modifying the contents of these files. Another possibility is to avoid these files from being accidentally deleted. Files on shared networks may be hidden for privacy reasons. The majority of hidden files contain environment settings or data that are viewed by applications that ... Read More

Testing and Debugging a Cron Job in Linux

Ahmed Abdul-Monem
Updated on 26-Mar-2025 11:50:35

703 Views

Cron jobs are essential for automating tasks on GNU/Linux systems, from backups and system maintenance to scheduled reports and data processing. However, setting up cron jobs correctly is only half the battle. Testing and debugging them is equally crucial to ensure they run as expected and don't introduce unexpected issues. In our comprehensive guide we will explore various techniques for testing and debugging cron jobs in Linux, helping you keep your automated tasks running smoothly. Why Test and Debug Cron Jobs? Cron jobs run in the background, often without direct user interaction. This makes it essential to test and debug ... Read More

Working with the AWS CLI for EC2

Bamdeb Ghosh
Updated on 08-May-2023 11:11:36

240 Views

Among the well-known cloud computing platforms is AWS (Amazon Web Services). Elastic Compute Cloud, or AWS EC2, is a well-known Amazon service. The Amazon CLI (Command Line Interface) is a potent tool that enables users to interact with the EC2 service via the command line in order to effectively administer EC2 instances. In-depth coverage of the Amazon CLI is provided in this article, along with examples of how to carry out various EC2 operations like establishing, listing, initiating, and terminating EC2 instances. The Amazon CLI can be used by users to automate challenging tasks and simplify cloud infrastructure management. Customers ... Read More

Memory Management: Background

Diksha Patro
Updated on 04-May-2023 13:37:40

3K+ Views

Introduction Memory management is a crucial part of computer systems that deals with managing memory resources. Memory is where computers store data, instructions, and programs while they are being used. Managing memory is important for the computer system to run smoothly. In this article, we will discuss what memory management is, and its benefits and drawbacks. Memory Management Memory management is a crucial task for the operating system, as it is responsible for managing the allocation and release of memory for different applications and processes. The operating system divides memory into different areas and assigns these regions to the applications ... Read More

Memory ballooning in OS

Diksha Patro
Updated on 04-May-2023 13:36:54

649 Views

Introduction Some operating systems use memory ballooning to optimize memory usage in virtualized environments. It entails dynamically reallocating memory resources among virtual machines (VMs) based on their current requirements. In this article, we will explore what is Memory Ballooning, and its advantages and disadvantages in detail. Memory Ballooning Memory ballooning is a technique used in virtualized environments to optimize the use of memory resources. It allows the operating system to reclaim unused memory from one virtual machine and allocate it to another that requires it. This helps to prevent resource waste and improves overall performance. Memory ballooning is achieved through ... Read More

Memory Allocation Techniques | Mapping Virtual Addresses to Physical Addresses

Diksha Patro
Updated on 04-May-2023 13:34:58

2K+ Views

Introduction In computer science and operating systems, memory allocation techniques are used to allocate memory to programs and processes. The mapping of virtual addresses to physical addresses is an important aspect of memory allocation because it allows programs to access the memory they require to run. Mapping Virtual Addresses to Physical Addresses Virtual addresses are used by programs to access memory, while physical addresses are the actual locations in RAM where data is stored.Memory allocation techniques manage the mapping of virtual addresses to physical addresses using different methods. Methods of Mapping Virtual Addresses to Physical Addresses There are three common ... Read More

Advertisements