Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Operating System Articles
Page 37 of 171
Differentiate between process switch and mode switch in OS
A process is defined as a program in execution and an entity that represents the basic unit of work to be implemented in the system. Understanding the difference between process switch and mode switch is crucial for comprehending how operating systems manage CPU resources and maintain system security. Process Switch A process switch (also called context switch) occurs when the processor switches from one thread/process to another thread or process. It involves saving the contents of CPU registers and instruction pointer for the current process. For the new task, the registers and instruction pointer are loaded into ...
Read MoreBest Command Line HTTP Client for Linux
In this tutorial, we will explore some of the most commonly used and famous HTTP clients that are present in Linux. A HTTP Client is a software that is mainly used to allow us to download files from the Internet. The primary reason for using HTTP clients is generally to download files, but these can also be used in case we want to debug or interact with a web server or multiple web servers. Now, let's consider the most famous HTTP Clients that are used. HTTPie With the name that almost resembles of the famous web protocol ...
Read MoreSending Emails From Terminal In Linux
You can send emails from the terminal in Linux by using the command line tool called mail. This tool is typically pre-installed on most Linux distributions. To send an email, you would use the syntax − echo "message body" | mail -s "subject" recipient@email.com You can also include attachments by using the -a option and specifying the path to the file you want to attach. echo "message body" | mail -s "subject" -a /path/to/attachment recipient@email.com You can also use other command line mail clients such as mutt, mailx, and msmtp. Architecture ...
Read MoreDifference Between .bashrc, .bash-profile, and .profile
When working with the command line on Unix or Linux systems, three configuration files play crucial roles in setting up your shell environment: .bashrc, .bash_profile, and .profile. Understanding when and how these files are executed is essential for effective shell customization and environment management. How Shell Configuration Files Work These files contain shell commands that are automatically executed at specific times during shell initialization. The key difference lies in when they are executed: Login shells − Started when you log into the system (SSH, console login) Non-login shells − Started when you open a new terminal ...
Read MoreHow to Clean a Linux Zombie Process
A Linux zombie process is a process that has completed execution, but its parent process has not yet collected its exit status. These processes remain in the system's process table consuming minimal resources but can accumulate over time. Understanding how to identify, handle, and prevent zombie processes is essential for maintaining system health. Zombie processes occur when a child process finishes but the parent hasn't called wait() or waitpid() to read the child's exit status. The process becomes a "zombie" − neither fully alive nor completely dead. What Are Zombie Processes When a process terminates, it doesn't ...
Read MoreSetting Permissions with chown and chmod
When working with files and directories in Linux, it's important to understand how to set permissions. Permissions define who can access and modify files and directories on a system. The chown and chmod commands are essential tools for managing ownership and access rights. Understanding Linux File Permissions In Linux, each file and directory has three types of permissions: read (r), write (w), and execute (x). These permissions can be set for three different categories of users − owner of the file or directory, group to which the file or directory belongs, and all other users. ...
Read MoreGuide to Stream Redirections in Linux
As a Linux user, it's essential to understand the concept of stream redirections. Stream redirections allow us to manipulate and control input and output streams of Linux commands. This means we can control where standard input, output, and error streams are going to and coming from. In this article, we'll guide you through the basics of stream redirections and show you how to use them with examples. Introduction to Stream Redirections In Linux, there are three types of streams − Standard Input (stdin) − This is the input stream that allows us to send data into ...
Read MoreUsing direct IO with ecryptfs and similar stackable file systems
Encryption is the process of converting plain text into an unreadable format known as ciphertext. Encrypted text can only be read with the help of a secret key or password. In the modern era, encryption has become a very important tool for maintaining data privacy and security. ecryptfs is a popular encryption mechanism used in Linux-based operating systems. It provides a secure and transparent way to encrypt files, directories, and entire filesystems. It is a stackable filesystem, which means that it can be layered on top of other filesystems to provide encryption without modifying the underlying storage layer. ...
Read MoreInstalling and Configuring Net-SNMP for Linux
Net-SNMP is an open-source software suite that implements Simple Network Management Protocol (SNMP) for managing network devices. It provides a wide range of tools that enable network administrators to monitor and manage their systems more effectively. In this article, we will explore how to install and configure Net-SNMP on a Linux system. Prerequisites Before we begin, ensure that you have access to a Linux system with root privileges. Additionally, make sure that system has an active internet connection to download necessary software packages. Installing Net-SNMP To install Net-SNMP on a Linux system, you can use package ...
Read MoreCopying SSH Keys to different Linux Machine
When working with multiple Linux machines, you often need to copy your SSH keys between systems to enable password-less authentication. This process involves securely transferring your public key from one machine to another and properly configuring the target machine to accept your key for authentication. SSH keys consist of a private key (kept secret on your local machine) and a public key (shared with remote machines). The public key is added to the target machine's authorized_keys file, allowing secure authentication without passwords. SSH Key Structure On your local machine, SSH keys are stored in the .ssh directory ...
Read More