Found 1466 Articles for Linux

Send stdout to Multiple Commands

Satish Kumar
Updated on 23-Mar-2023 16:50:37

682 Views

Introduction When it comes to programming, there are numerous occasions when we need to execute multiple commands and take input or output from a single command. In such cases, sending output of a command to multiple commands becomes an essential task. Sending stdout to multiple commands is one of most frequently used techniques in programming. In this article, we will discuss what stdout is and how we can send it to multiple commands with examples. So, let’s get started. What is stdout? Stdout (Standard Output) is a default stream in Unix-like operating systems, which is used to display output of ... Read More

Execute Bash Script Directly From a URL

Satish Kumar
Updated on 23-Mar-2023 16:42:08

8K+ Views

Introduction Bash scripting is a powerful way of automating repetitive tasks and executing complex commands with a single script. With increasing popularity of web-based technologies, it's now possible to execute Bash scripts directly from a URL. This opens up a whole new world of possibilities for web developers and system administrators. In this article, we'll explore how to execute Bash scripts directly from a URL and provide some examples to help you get started. What is Bash Scripting? Bash scripting is a type of scripting language that is commonly used on Unix-based systems such as Linux and macOS. Bash stands ... Read More

Combine and Execute Multiple Linux Commands

Satish Kumar
Updated on 23-Mar-2023 16:21:10

1K+ Views

Linux is a powerful and versatile operating system that has gained immense popularity in computing world. One of most useful features of Linux is ability to combine and execute multiple commands at once, which can significantly improve your productivity and efficiency. In this article, we will discuss various techniques for combining and executing multiple Linux commands, along with examples that demonstrate their practical applications. Combining Commands with Pipes The most common way to combine Linux commands is by using pipes. A pipe is a feature that allows output of one command to be passed as input to another command. syntax ... Read More

Command Substitution in Bourne Shell

Satish Kumar
Updated on 23-Mar-2023 16:19:40

468 Views

Introduction In world of Unix and Linux, Bourne shell is a popular and widely used command-line interface for interacting with operating system. One of most powerful features of Bourne shell is command substitution, which allows you to use output of one command as input for another. This article will explore command substitution in Bourne shell, including how it works, why it's useful, and some practical examples. What is Command Substitution? In Bourne shell, command substitution is a feature that allows you to take output of one command and use it as input for another command. This is done by enclosing ... Read More

How to End Processes With kill, pkill, and killall

Satish Kumar
Updated on 23-Mar-2023 16:17:44

4K+ Views

When working with a Unix-based operating system such as Linux or macOS, it is common to encounter situations where a process becomes unresponsive or needs to be terminated for some reason. Fortunately, there are several command-line utilities available that allow users to end processes in a variety of ways. In this article, we will explore three of most commonly used utilities for terminating processes: kill, pkill, and killall. We will cover their basic usage, common options, and examples of how they can be used to manage processes on a Unix system. Basic usage of kill, pkill, and killall Before diving ... Read More

Why Do We Use su – and Not Just su

Satish Kumar
Updated on 23-Mar-2023 10:45:01

1K+ Views

Introduction The Linux operating system is a powerful tool that offers a wide range of features and functionalities to its users. One of most common tasks performed by system administrators on Linux systems is to switch to root user account using su command. However, in some cases, it is recommended to use su – instead of just su. In this article, we will explore reasons behind using su – and provide examples of how it can be beneficial. What is difference between su and su –? The su command is used to switch to another user account on system, typically ... Read More

Easy Ways to Determine Virtualization Technology

Satish Kumar
Updated on 23-Mar-2023 10:31:49

257 Views

Virtualization technology has been a game-changer for IT industry, offering businesses and organizations an efficient and cost-effective solution to manage their IT infrastructure. Virtualization enables organizations to consolidate multiple servers into one physical host, reducing need for additional hardware and saving on energy and maintenance costs. Virtualization also allows organizations to quickly and easily create and manage virtual machines, enabling them to scale up and down as needed, and respond to changing business requirements. With increasing popularity of virtualization, businesses are faced with challenge of choosing right virtualization technology that best suits their needs. There are several virtualization technologies available ... Read More

Linux Kernel Versions 32-Bit vs 64-Bit

Satish Kumar
Updated on 23-Mar-2023 10:28:16

2K+ Views

Introduction Linux is an open-source operating system that is widely used in servers, supercomputers, and embedded systems. kernel is core component of Linux, which controls all resources and services of system. Linux kernel comes in two versions, 32-bit and 64-bit, which have some significant differences. In this article, we will explore differences between these two versions and their impact on performance and capabilities of Linux. 32-Bit vs 64-Bit Architecture The terms 32-bit and 64-bit architecture refer to way that processors handle data. In a 32-bit architecture, processor can handle data in 32-bit chunks, while in a 64-bit architecture, processor can ... Read More

Generating an SHA-256 Hash From Command Line

Satish Kumar
Updated on 14-Mar-2023 16:31:49

14K+ Views

As technology becomes increasingly integrated into our daily lives, security concerns continue to grow. It's more important than ever to ensure that our data is secure and protected from cybercriminals. One way to help protect data is to use a hash function. SHA-256 is one such hash function that can be used to create a unique digital fingerprint for data. In this article, we'll explore how to generate an SHA-256 hash from command line. What is SHA-256? SHA-256 is a cryptographic hash function that takes input data and produces a fixed-length output, or hash, of 256 bits. function is designed ... Read More

Introduction to Iptables

Satish Kumar
Updated on 14-Mar-2023 16:31:19

5K+ Views

Introduction to iptables Iptables is a Linux-based firewall application that controls incoming and outgoing traffic. It is a powerful tool that can be used to secure a server, limit access to specific applications or services, and mitigate risk of malicious attacks. This article will provide an introduction to iptables, its purpose, and its basic usage. What is iptables? Iptables is a firewall application that works with Linux kernel. It controls incoming and outgoing traffic and provides a mechanism to filter, block, or allow traffic based on various criteria, such as port number, IP address, protocol, and more. Iptables is designed ... Read More

Advertisements