
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1354 Articles for Open Source

543 Views
The dmesg command is a powerful tool in the Linux command−line arsenal. It stands for "diagnostic message" and is used to read and write data from/to the kernel ring buffer, a data structure that holds messages about the system's hardware, kernel, or driver messages. This article will guide you through the usage of the dmesg command, complete with examples and their outputs. Basic Usage The most basic usage of the dmesg command is to simply type dmesg into your terminal and hit enter. This will display all the kernel messages in your terminal. $ dmesg The output will be ... Read More

6K+ Views
The read command is one of the most fundamental commands in Bash scripting. It is used to read input from the user or from a file. In this article, we will explore how to use the read command effectively, with several examples and their output. Basic Usage of read Command The most basic usage of the read command is to take input from the user. Here's a simple example − Example echo "Please enter your name: " read name echo "Hello, $name" When you run this script, it will prompt you to enter your name. After you enter your ... Read More

4K+ Views
The Advanced Packaging Tool, or APT, is a powerful command-line tool used in Debian based systems like Ubuntu, Linux Mint, and others. The apt−get command is one of the most common ways to interact with APT. It's used to handle packages, allowing you to install, upgrade, and remove software on your Linux system. In this guide, we'll walk you through the basics of using the apt−get command, complete with examples and their outputs. 1. Updating Package Lists: apt−get update The first command you should know is apt−get update. This command retrieves information about the newest versions of packages and their ... Read More

663 Views
Ansible is a powerful automation tool that allows you to manage and configure systems, deploy software, and orchestrate more advanced IT tasks such as continuous deployments or zero downtime rolling updates. One of the key components of Ansible is the inventory file, which describes the hosts and groups of hosts upon which commands, modules, and tasks in a playbook operate. In this article, we'll explore how to use both static and dynamic inventories in Ansible, complete with examples and their outputs. Static Inventories Static inventories are the simplest way to manage and organize your servers. They are defined in INI ... Read More

643 Views
The shred command in Linux is a powerful tool that allows users to permanently delete files and make them unrecoverable. This command is particularly useful when you want to ensure that sensitive data is completely removed from a system. In this article, we will explore how to use the shred command, complete with examples and outputs. Understanding the shred Command Before we delve into the examples, it's important to understand what the shred command does. When you delete a file in Linux using the rm command, the file is not actually removed from the disk. Instead, the space that the ... Read More

428 Views
The IP command is a powerful tool for network configuration in Linux. It is used to show, manipulate routing, devices, policy routing, and tunnels. The IP command is part of the iproute2 package, which is installed by default in most Linux distributions. This article will guide you through the basics of the IP command and provide examples to help you understand its usage. Displaying IP Addresses To display the IP address of all network interfaces, use the following command− Example ip addr show Output 1: lo: mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 ... Read More

5K+ Views
Xfce and GNOME are two popular desktop environments for Linux and other open-source operating systems. While both provide a graphical user interface (GUI) to interact with the system, there are numerous variations between Xfce and GNOME in terms of design philosophy, user interface, resource utilization, and customization choices. Read this article to find out more about Xfce and GNOME and how they are different from each other. What is Xfce? Xfce is a small, open-source desktop environment popular on Linux and other Unix-like operating systems. It is designed to be fast, effective, and simple to use, making it a good ... Read More

12K+ Views
Introduction Proxy servers are intermediary servers that act as a gateway between a user's device and the internet. When connected to the internet through a proxy server, all data requests from the user's device are first sent to the proxy server which then forwards them to the internet. Similarly, when data is received from the internet, it first goes through the proxy server before reaching the user's device. There are several types of proxies including HTTP proxies, HTTPS proxies and SOCKS proxies. Each type of proxy serves different purposes with varying degrees of security and privacy. Understanding Proxy Settings on ... Read More

2K+ Views
Introduction Configuring Postfix and Dovecot with virtual domain users is an essential process for anyone running a Linux-based email server. These two software applications are the backbone of email servers, and they work together to handle incoming and outgoing emails. Postfix is the mail transfer agent responsible for accepting incoming emails. On the other hand, Dovecot is the email delivery agent responsible for delivering incoming emails to users' mailboxes. In this article, we will provide a detailed guide on how to configure Postfix and Dovecot with virtual domain users in Linux. Explanation of Postfix and Dovecot Postfix is ... Read More

762 Views
Introduction In today's digital age, security is of utmost importance. The rise of cyber threats and data breaches has shown that no system is completely safe. System administrators and IT professionals must take proactive measures to protect their systems and data. One such measure is the use of Pluggable Authentication Modules (PAM) for user authentication. PAM is a powerful tool that allows system administrators to customize the authentication process for their systems. It enables the use of multiple authentication methods, such as passwords, tokens, and biometrics, among others. This flexibility makes it easier for administrators to manage access ... Read More