Operating System Articles

Page 116 of 171

Guide to Linux jq Command for JSON Processing

Bamdeb Ghosh
Bamdeb Ghosh
Updated on 17-Mar-2026 13K+ Views

JSON (JavaScript Object Notation) is a popular data format used for exchanging information between applications. It is lightweight and easy to understand. To process JSON data efficiently, Linux provides a command-line tool called jq. This powerful tool enables users to extract, manipulate, and transform JSON data with ease. With jq, users can quickly perform filtering, sorting, and selecting specific fields. Additionally, jq supports various output formats, making it easy to integrate with other command-line tools. Installation Before using jq, ensure it is installed on your system. jq can be installed using the Linux package manager. Ubuntu/Debian Installation ...

Read More

3 Ways to Install Spotify [Music Streaming] in Fedora Linux

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

If you're a music lover using Fedora Linux as your primary operating system, you might be wondering how to install Spotify. Fortunately, there are several straightforward methods to get Spotify running on Fedora Linux. This article explores the three most reliable and practical ways to install Spotify on your Fedora system. Method 1: Install Spotify Using Flatpak One of the easiest and most reliable ways to install Spotify on Fedora Linux is using Flatpak. Flatpak is a universal packaging system that provides sandboxed applications with consistent dependencies across different Linux distributions. Steps to Install via Flatpak ...

Read More

3 Ways to Permanently and Securely Delete Files and Directories in Linux

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 3K+ Views

Linux is an incredibly powerful and versatile operating system widely used in the computing industry. One of the most important aspects of using any computer system is the ability to manage files and directories. In this article, we will discuss three ways to permanently and securely delete files and directories in Linux. Why Secure File Deletion is Important When you delete a file or directory from your computer, it does not necessarily mean that the data is gone forever. In most cases, the data is still present on your hard drive or storage device, but it is marked ...

Read More

3 Ways to Set a Static IP Address in RHEL 8

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 22K+ Views

RHEL 8 (Red Hat Enterprise Linux 8) is a popular Linux-based operating system used by many organizations for their servers and workstations. In RHEL 8, IP (Internet Protocol) addresses can be set dynamically or statically. A dynamic IP address is assigned automatically by a DHCP (Dynamic Host Configuration Protocol) server, while a static IP address is manually configured by the user. In this article, we will discuss three ways to set a static IP address in RHEL 8. Using Network Manager GUI The Network Manager GUI is a graphical user interface that makes it easy to manage network ...

Read More

4 Free Shell Scripting eBooks for Linux Newbies and Administrators

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 833 Views

As Linux continues to gain popularity as an operating system for servers and other computing devices, the need for skilled Linux administrators is on the rise. One crucial skill for any Linux administrator is shell scripting. Shell scripting is the process of creating programs that automate tasks in a Linux environment, making it easier and faster for administrators to manage their systems. If you are new to Linux or are looking to improve your shell scripting skills, there are several free ebooks available to help you get started. In this article, we will explore four free ebooks that are ...

Read More

4 Useful Tips to Secure PhpMyAdmin Login Interface

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 4K+ Views

PhpMyAdmin is a popular web-based tool used by developers to manage and administer MySQL databases. It provides an intuitive interface for creating, modifying, and deleting databases, tables, and records. However, like any web application, PhpMyAdmin is vulnerable to security threats if not properly configured. This article covers four essential tips to secure your PhpMyAdmin login interface and protect your database from unauthorized access. Change Default Login Credentials One of the most critical security steps is changing the default MySQL credentials. Many installations use predictable usernames like root with weak passwords, making them easy targets for attackers. To ...

Read More

4 Useful Tools to Monitor CPU and GPU Temperature in Ubuntu

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 24K+ Views

Ubuntu is one of the most popular and widely used Linux distributions. It is known for its simplicity, reliability, and performance. However, like any other operating system, Ubuntu is not immune to overheating issues. Overheating can lead to a number of problems, such as decreased performance, system crashes, and even hardware damage. Therefore, it is important to monitor the temperature of your CPU and GPU regularly to prevent such issues from occurring. lm-sensors lm-sensors is a command-line tool that allows you to monitor temperature, voltage, and fan speed of your CPU, GPU, and other system components. It is ...

Read More

4 Ways to Check CentOS or RHEL Version

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 17K+ Views

If you're using CentOS or RHEL (Red Hat Enterprise Linux), knowing your system version is essential for package management, troubleshooting, and security updates. There are several reliable methods to determine which version you're running. This article covers four effective methods to check your CentOS or RHEL version, each with step-by-step instructions and example outputs. Method 1: Check /etc/redhat-release File The /etc/redhat-release file contains version information about your CentOS or RHEL system, including the release number and update level. This is the most straightforward method. To check the contents of the /etc/redhat-release file: cat /etc/redhat-release ...

Read More

4 Ways to Find Out What Ports Are Listening in Linux

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 5K+ Views

Linux is a popular operating system widely used by system administrators, developers, and security professionals. One of the most important tasks in managing a Linux system is to identify which ports are listening and which processes are using them. This knowledge is crucial for system security, troubleshooting network issues, and service management. In this article, we will discuss several effective methods to find out what ports are listening in Linux. Using netstat Command The netstat command is a traditional network utility that provides detailed information about network connections, routing tables, and interface statistics. To check which ports are ...

Read More

4 Ways to Generate a Strong Pre-Shared Key (PSK) in Linux

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 2K+ Views

Pre-shared key (PSK) is a security mechanism used to protect network communication by ensuring that only authorized devices can access it. It is a shared secret key that must be kept confidential to prevent unauthorized access to the network. In Linux, there are several ways to generate a strong PSK, and in this article, we will discuss four primary methods. Method 1: Random Character Generation One of the simplest ways to generate a strong PSK is to use a random combination of characters. This can be done using various Linux command-line utilities. Using OpenSSL The openssl ...

Read More
Showing 1151–1160 of 1,707 articles
« Prev 1 114 115 116 117 118 171 Next »
Advertisements