Operating System Articles

Page 27 of 171

dutree – A CLI Tool to Analyze Disk Usage in Coloured Output

Prateek Jangid
Prateek Jangid
Updated on 17-Mar-2026 431 Views

The dutree is an open-source command line tool for Linux that analyzes disk usage and displays output in a colorful, tree-like format. This tool combines the functionality of du (disk usage) and tree (directory structure) commands, written in the Rust programming language. It helps identify which directories and files consume the most disk space, making it easier to manage storage and free up space when needed. Unlike traditional disk usage tools that display plain text output, dutree provides visual hierarchy with color coding, making it easier to quickly identify large files and directories at a glance. Installation ...

Read More

How to Check Debian Linux Version?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 2K+ Views

Debian Linux is an open-source operating system that is widely used in both personal and professional settings. It was first released in 1993 and has since gained a reputation for being stable, secure, and reliable. Knowing your Debian version is crucial for system administration, software compatibility, and security updates. Command Line Methods The command line interface provides the fastest and most reliable way to check your Debian version. Here are the most common methods: Using cat /etc/debian_version This command displays the Debian version number stored in the system file: cat /etc/debian_version ...

Read More

How to Check CPU Utilization in Linux with Command Line?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

Monitoring the performance of a Linux system is essential to ensuring that it operates optimally. One of the key factors in determining system performance is CPU utilization. CPU utilization refers to the percentage of time that the processor spends executing instructions from various processes and applications on the system. In Linux, there are numerous tools available for monitoring CPU utilization, but using command line tools provides a quick and efficient way to check this metric. Basic Command Line Tools for Checking CPU Utilization When it comes to monitoring CPU utilization with the command line in Linux, you ...

Read More

How to Check CPU Temperature on Linux?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 19K+ Views

Monitoring CPU temperature on a Linux system is essential for maintaining optimal performance and preventing hardware damage. The CPU generates heat as it processes data, and excessive heat can cause system instability, thermal throttling, or permanent hardware failure. This guide covers various methods to check CPU temperature on Linux using both command-line and graphical tools. Understanding CPU Temperature Monitoring CPU temperature is measured in degrees Celsius and indicates how hot the processor is running. When temperatures exceed safe limits (typically 70-80°C for most CPUs), the processor may throttle its speed to reduce heat generation, resulting in decreased ...

Read More

Guider - A System Wide Linux Performance Analyzer

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 265 Views

Guider is a powerful system-wide Linux performance analyzer designed to provide developers, system administrators, and technical professionals with comprehensive insights into Linux system performance. Unlike traditional tools that focus on individual processes, Guider monitors the entire system including CPU usage, memory consumption, disk I/O, network traffic, and process activity to identify performance bottlenecks and optimization opportunities. Overview of Guider Guider provides real-time system-wide performance monitoring capabilities across all major system resources. It collects data from kernel interfaces to present a holistic view of system behavior, enabling administrators to understand how different components interact and affect overall performance. ...

Read More

Protection ring

Pranavnath
Pranavnath
Updated on 17-Mar-2026 2K+ Views

Protection rings are a security mechanism used by operating systems to control access to system resources and hardware. These rings create a hierarchical privilege structure, with each ring having different levels of access permissions. The central ring (Ring 0) at the kernel level has the highest privilege and can access all resources, while outer rings have progressively fewer permissions. This mechanism is hardware-enforced by the CPU architecture at different access modes. The x86 processor architecture implements four protection rings (Ring 0 to Ring 3), where Ring 0 has the highest privilege level and Ring 3 has the lowest. ...

Read More

Convert Hex to ASCII Characters in the Linux Shell

Vishesh Kumar
Vishesh Kumar
Updated on 17-Mar-2026 10K+ Views

Hexadecimal (Hex) is a base-16 numbering system that uses digits 0-9 and letters A-F to represent values. Converting hex to ASCII characters is a common task in Linux systems, especially when dealing with encoded data, network protocols, or binary file analysis. Hex digits: 0 1 2 3 4 5 6 7 8 9 A B C D E F ASCII (American Standard Code for Information Interchange) is a character encoding standard that represents text in computers and communication equipment. Each ASCII character corresponds to a specific numeric value that can be expressed in hexadecimal format. ...

Read More

Process Management

Amit Diwan
Amit Diwan
Updated on 17-Mar-2026 4K+ Views

A process is an active program — a program that is under execution. It contains the program code, program counter, process stack, registers, and other execution context information. Process States During its lifecycle, a process transitions through different states. These state changes are managed by the operating system scheduler and occur based on resource availability and system events. Process State Diagram New Ready Running ...

Read More

Structure of a Client Server System

Ricky Barnes
Ricky Barnes
Updated on 17-Mar-2026 6K+ Views

In client-server computing, the clients request a resource and the server provides that resource. A server may serve multiple clients at the same time while a client is in contact with only one server. This architecture forms the backbone of modern distributed systems, web applications, and enterprise software. The different structures for two-tier and three-tier architectures are given as follows − Two-Tier Client/Server Structure The two-tier architecture primarily has two parts: a client tier and a server tier. The client tier sends a request to the server tier and the server tier responds with the desired information. ...

Read More

Dual-Mode and Multi-Mode Operation in Operating System

David Meador
David Meador
Updated on 17-Mar-2026 10K+ Views

Dual-mode operation is a fundamental security mechanism in modern operating systems that provides two distinct execution modes: user mode and kernel mode. This separation ensures system stability by preventing user applications from directly accessing critical system resources and executing privileged instructions. Dual-Mode Operation User Mode Mode bit = 1 • Limited privileges • User applications Kernel Mode Mode bit = 0 • Full ...

Read More
Showing 261–270 of 1,707 articles
« Prev 1 25 26 27 28 29 171 Next »
Advertisements