Operating System Articles

Page 54 of 171

Move all files except one on Linux

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 5K+ Views

When working with Linux, you may need to move multiple files from one directory to another while keeping specific files in their original location. This is a common task for file organization, cleanup operations, or selective backups. Linux provides several methods to accomplish this using different command-line approaches. Renaming The Unwanted File This method involves temporarily renaming the file you want to keep by adding a dot prefix, making it a hidden file. The mv command with wildcards will ignore hidden files, allowing you to move everything else. # Rename the file to keep as hidden ...

Read More

Change the Install directory with make install

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 5K+ Views

When building software packages from source, you often need to control where the compiled software gets installed. By default, packages are typically installed in standard system directories like /usr or /usr/local. However, you might want to install to a custom location for testing, creating packages, or installing software for a single user without requiring root privileges. Using ./configure Parameters Most modern software packages use autotools (autoconf/automake) which provides a ./configure script with standardized parameters for controlling installation directories. Common Configure Parameters --prefix= − Base directory for installation (default: /usr or /usr/local) --bindir= − Directory for ...

Read More

Difference between Trap and Interrupt in Operating System

Pradeep Kumar
Pradeep Kumar
Updated on 17-Mar-2026 6K+ Views

An operating system manages computer system resources and serves as an interface between hardware and software. A crucial component of operating system design is handling events that occur during program execution. Traps and interrupts are two fundamental mechanisms used for this purpose. A trap is a software-generated event that results from an error, exception, or system call in the currently executing program. Examples include division by zero, page faults, and illegal instructions. When a trap occurs, the CPU immediately switches to kernel mode and transfers control to the operating system's trap handler. An interrupt is a hardware-generated event ...

Read More

How to Deploy Data-Centers with Cluster and Add ISCSI Storage in RHEV Environment?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 322 Views

Data-center deployment involves setting up computer systems, storage, networking, and applications to support business operations. Red Hat Enterprise Virtualization (RHEV) provides a robust platform for managing data-center resources efficiently using KVM hypervisor technology, which enables multiple operating systems to run on the same physical machine with storage management, high availability, and live migration capabilities. Understanding Cluster Deployment in RHEV Environment In a data-center environment, deploying a cluster ensures high availability and reliability. A cluster is a group of servers that work together to provide services and resources to clients. In RHEV, clusters enable distribution of virtual machines across ...

Read More

How to Deploy Elasticsearch on Kubernetes?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 2K+ Views

In today's world, data is the lifeblood of businesses. Whether it is customer data, sales data, or product data, the ability to store, search, and analyze it effectively can make a significant difference in a company's success. Elasticsearch is a distributed search and analytics engine designed for speed and scalability. It can process millions of queries per second and handle petabytes of data with ease. Kubernetes, on the other hand, is an open-source container orchestration system that automates application deployment, scaling, and management. Setting up the Environment Installing the Necessary Tools (kubectl, helm) Before deploying Elasticsearch ...

Read More

How to Deploy Nginx on a Kubernetes Cluster?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 524 Views

Nginx is a high-performance web server widely used for load balancing, reverse proxying, and serving static content. Kubernetes is a container orchestration platform that automates deployment, scaling, and management of containerized applications. Deploying Nginx on Kubernetes provides scalability, high availability, and efficient resource management for web applications. Prerequisites Before deploying Nginx on Kubernetes, ensure you have the following − Kubernetes Cluster Access − A running cluster (local minikube, cloud provider like GKE, EKS, or AKS) kubectl CLI − Command-line tool configured to connect to your cluster Basic Kubernetes Knowledge − Understanding of Pods, Services, Deployments, and ...

Read More

How to Develop Own Custom Linux Distribution From Scratch?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

Linux is an open-source operating system that is widely used by developers, system administrators, and individuals who prefer a non-proprietary operating system. A Linux distribution, often simply called a "distro, " is a customized version of the Linux operating system that includes different software packages and configurations to fit specific needs. There are hundreds of Linux distributions available, ranging from popular ones like Ubuntu and Fedora to specialized ones like Kali Linux for cybersecurity professionals. Creating your own custom Linux distribution allows you to tailor the operating system to your exact requirements, removing unnecessary components and adding specialized tools. ...

Read More

How to Configure Network Static IP Address in Ubuntu 18.04?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

The Internet Protocol (IP) address is a crucial component of computer networking as it uniquely identifies each device connected to a network. By default, most network interfaces are configured to obtain an IP address dynamically from a router or DHCP server. However, in some cases, it is necessary to configure a static IP address. A static IP address is an IP address that is manually assigned to a device and does not change over time unless manually reconfigured. In this article, we will discuss how to configure a static IP address on Ubuntu 18.04 and why it's important in ...

Read More

How to Configure PAM to Audit Logging Shell User Activity?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 923 Views

In today's digital age, security is of utmost importance. The rise of cyber threats and data breaches has shown that no system is completely safe. System administrators and IT professionals must take proactive measures to protect their systems and data. One such measure is the use of Pluggable Authentication Modules (PAM) for user authentication. PAM is a powerful tool that allows system administrators to customize the authentication process for their systems. It enables the use of multiple authentication methods, such as passwords, tokens, and biometrics, among others. This flexibility makes it easier for administrators to manage access controls and ...

Read More

How to Configure Postfix and Dovecot with Virtual Domain Users in Linux?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 2K+ Views

Configuring Postfix and Dovecot with virtual domain users is an essential process for anyone running a Linux-based email server. These two software applications work together to handle incoming and outgoing emails. Postfix is the mail transfer agent (MTA) responsible for routing and delivering email messages, while Dovecot is the mail delivery agent (MDA) that delivers incoming emails to users' mailboxes and allows clients to retrieve them. This guide provides a step-by-step approach to configure both services for virtual domain users, allowing you to host multiple email domains on a single server without creating system users for each email account. ...

Read More
Showing 531–540 of 1,707 articles
« Prev 1 52 53 54 55 56 171 Next »
Advertisements