Satish Kumar

Satish Kumar

937 Articles Published

Articles by Satish Kumar

Page 14 of 94

10 ‘Avconv’ Commands to Record, Convert and Extract Videos & Audios from Linux Terminal

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 413 Views

Are you a Linux user who frequently works with video and audio files? If so, you'll want to learn about the versatile avconv tool. Avconv is a command-line utility that can record, convert, and extract videos and audios from Linux terminals. In this article, we'll explore 10 essential avconv commands that you can use to accomplish a variety of multimedia tasks. Record a Video The first avconv command we'll look at is how to record a video. This is useful when you need to capture a video of your screen or webcam. Here's the command − ...

Read More

How to Generate & Set Up SSH Keys on CentOS 7?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 2K+ Views

SSH keys are cryptographic key pairs that provide a secure authentication method for connecting to remote servers. Unlike traditional password-based authentication, SSH keys offer enhanced security by using public-key cryptography. The private key remains on your local machine, while the public key is placed on remote servers you want to access. SSH keys eliminate the risk of password-based attacks and provide a more convenient way to authenticate, especially when managing multiple servers. CentOS 7 includes all the necessary tools to generate and manage SSH keys out of the box. Generating SSH Keys on CentOS 7 Basic SSH ...

Read More

How to Generate & Set Up SSH Keys on Debian 10?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

In today's world, where most communication and data transfer happens over networks and the internet, security has become a crucial issue. An unsecured network can allow malicious users to intercept, modify, or steal sensitive data. To ensure secure communication over a network, encryption plays an essential role. Secure Shell (SSH) is an encrypted protocol that allows you to access a remote system securely. It provides secure communication between two untrusted hosts over an insecure network. SSH keys are authentication credentials used by SSH for secure communication between systems. They provide a more secure way of logging into a ...

Read More

How to Configure Network Static IP Address in Ubuntu 18.04?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

The Internet Protocol (IP) address is a crucial component of computer networking as it uniquely identifies each device connected to a network. By default, most network interfaces are configured to obtain an IP address dynamically from a router or DHCP server. However, in some cases, it is necessary to configure a static IP address. A static IP address is an IP address that is manually assigned to a device and does not change over time unless manually reconfigured. In this article, we will discuss how to configure a static IP address on Ubuntu 18.04 and why it's important in ...

Read More

How to Call an External Program Using awk

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

Awk is a powerful text processing tool that can automate various tasks such as data manipulation, filtering, and reporting. One of its most interesting features is the ability to call external programs from within an awk script, extending its functionality beyond text processing. Understanding the system() Function The system() function is used to execute external commands from within awk. The syntax is straightforward: system(command) The command argument is the external command you want to execute. When system() is called, awk passes the command to the shell for execution. The shell executes the command and ...

Read More

Add, Update, and Remove Git Submodule

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 4K+ Views

Git submodules are a powerful feature that allows you to incorporate external repositories as subdirectories within your project. This enables code reuse from other repositories while maintaining independent version control for both the parent project and submodules. In this article, we will explore how to add, update, and remove Git submodules with practical examples and best practices for effective submodule management. Adding a Git Submodule To add a new submodule to your project, use the git submodule add command. This command takes the URL of the submodule repository and the local path where it should be placed. ...

Read More

10 ‘free’ Commands to Check Memory Usage in Linux

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 5K+ Views

If you are a Linux user, you may have heard of the term memory usage. Memory usage refers to the amount of memory being used by your computer at any given time. It is an important metric to keep track of, as excessive memory usage can cause your system to slow down or even crash. Fortunately, Linux provides a built-in tool called free that allows you to check your system's memory usage. In this article, we will go over how to use the free command to check memory usage in Linux. What is the free Command? The free ...

Read More

How to Generate a Certificate Signing Request (CSR) With OpenSSL?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

A Certificate Signing Request (CSR) is a digital document containing information about the entity requesting an SSL/TLS certificate. The CSR includes the public key and identifying information such as organization name, domain, and location. This information enables a Certificate Authority (CA) to verify the requester's identity and issue a valid SSL/TLS certificate. The CSR is essential for obtaining SSL/TLS certificates because it provides the verification mechanism for domain ownership and organizational identity. Without a properly generated CSR, you cannot secure your website with encryption. Understanding OpenSSL and Its Components OpenSSL is an open-source cryptographic toolkit that provides ...

Read More

10 Best PuTTY Alternatives for SSH Remote Connection

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 3K+ Views

If you're a system administrator, developer, or network engineer, chances are you've used PuTTY at some point. PuTTY is a popular SSH client for Windows that's been around for over two decades. However, there are several PuTTY alternatives that offer more features and better user experience. In this article, we'll explore the 10 best PuTTY alternatives for SSH remote connections. What is PuTTY? PuTTY is a free and open-source terminal emulator and SSH client for Windows. It supports various network protocols including SSH, Telnet, rlogin, and SCP, and can also act as a serial console client. PuTTY is ...

Read More

Read Random Line From a File in Linux

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 2K+ Views

In Linux, reading a random line from a file can be a useful task in various scenarios. For example, when you want to select a random word from a dictionary or randomly select a line from a log file for analysis purposes. There are several ways to read a random line from a file in Linux. In this article, we will explore different methods to achieve this task along with their pros and cons. Method 1 − Using shuf Command The shuf command is a simple and efficient way to read a random line from a file in ...

Read More
Showing 131–140 of 937 articles
« Prev 1 12 13 14 15 16 94 Next »
Advertisements