Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Satish Kumar
Page 19 of 94
10 Best Arch Linux Based User Friendly Distributions
Arch Linux is known for its minimalistic approach and flexibility, offering a powerful environment for advanced users. However, for beginners, it can be challenging to set up and maintain. This is where Arch Linux-based distributions come into play, providing easier installation processes and pre-configured environments for a smoother user experience. In this article, we will explore the 10 best Arch Linux-based user-friendly distributions that combine the power of Arch with enhanced usability. 1. Manjaro Manjaro is one of the most popular Arch Linux-based distributions, providing a user-friendly experience without compromising on flexibility. It comes with a pre-configured ...
Read MoreHow to Hide Nginx Server Version in Linux?
Nginx is a popular open-source web server that is used by many companies and websites to serve their content efficiently. By default, Nginx displays the server version number in its response headers, which can be viewed by anyone with access to a web browser or other network analysis tools. While this information may seem harmless, it can actually pose significant risks to your website's security. Revealing your server version makes your website an easier target for attackers who can research known vulnerabilities specific to that version. Understanding the Security Risks Exploitation by Attackers One of the ...
Read MoreMove all files except one on Linux
When working with Linux, you may need to move multiple files from one directory to another while keeping specific files in their original location. This is a common task for file organization, cleanup operations, or selective backups. Linux provides several methods to accomplish this using different command-line approaches. Renaming The Unwanted File This method involves temporarily renaming the file you want to keep by adding a dot prefix, making it a hidden file. The mv command with wildcards will ignore hidden files, allowing you to move everything else. # Rename the file to keep as hidden ...
Read MoreSending Emails From Terminal In Linux
You can send emails from the terminal in Linux by using the command line tool called mail. This tool is typically pre-installed on most Linux distributions. To send an email, you would use the syntax − echo "message body" | mail -s "subject" recipient@email.com You can also include attachments by using the -a option and specifying the path to the file you want to attach. echo "message body" | mail -s "subject" -a /path/to/attachment recipient@email.com You can also use other command line mail clients such as mutt, mailx, and msmtp. Architecture ...
Read More7 Best Web Hosting Companies for Linux
If you're in the market for a web hosting company for your Linux-based website, there are plenty of options available to you. However, not all web hosting companies are created equal, and finding the right one for your needs can be a daunting task. In this article, we will take a look at seven of the best web hosting companies for Linux, each with its own unique features and benefits. Bluehost Bluehost is a well-known web hosting company that offers a wide range of hosting plans, including shared hosting, VPS hosting, and dedicated hosting. They also offer a ...
Read MoreHow to Hide PHP Version Number in HTTP Header?
The HTTP header contains crucial information about web communication between client and server, including details about the software running your website. This may reveal your website's PHP version number, which can pose significant security risks. PHP powers over 80% of websites worldwide, making it a high-value target for attackers. When your PHP version is exposed in HTTP headers, malicious actors can exploit known vulnerabilities specific to that version. Hiding this information is essential for maintaining website security and preventing targeted attacks. Why Hide PHP Version Information? Exposing PHP version numbers allows attackers to − Identify ...
Read MoreChange the Install directory with make install
When building software packages from source, you often need to control where the compiled software gets installed. By default, packages are typically installed in standard system directories like /usr or /usr/local. However, you might want to install to a custom location for testing, creating packages, or installing software for a single user without requiring root privileges. Using ./configure Parameters Most modern software packages use autotools (autoconf/automake) which provides a ./configure script with standardized parameters for controlling installation directories. Common Configure Parameters --prefix= − Base directory for installation (default: /usr or /usr/local) --bindir= − Directory for ...
Read MoreHow To Host a Website with HTTPS Using Caddy on Linux?
When it comes to website security, HTTPS is an essential component. HTTPS (Hypertext Transfer Protocol Secure) is a protocol that encrypts data being transmitted between a website and its visitors. The encryption ensures that sensitive information like login credentials or payment details cannot be intercepted by third-party users. Without HTTPS, websites are vulnerable to attacks like man-in-the-middle attacks and phishing scams, which can lead to significant data breaches and loss of user trust. Additionally, search engines like Google consider HTTPS a ranking factor, providing SEO benefits. Preparing the Environment Setting up a domain name and DNS records ...
Read MoreExtracting a substring using Linux bash
Extracting a substring from a string is a fundamental text processing operation in Linux. This involves isolating specific portions of text based on character positions (index-based) or patterns (delimiter-based). We'll explore different methods to extract substrings from strings using the Linux command line, covering both index-based and pattern-based approaches. Index-Based Substring Extraction Index-based extraction involves specifying the starting position and length of the desired substring. Here are four common methods: Using the cut Command The cut command extracts characters from position N to position M using the -c option. Note that cut uses 1-based indexing. ...
Read MoreWhat Does cd do on Linux
The cd command stands for "change directory" and is used to navigate the file system on a Linux computer. When used with a specific directory path as an argument, cd will change the current working directory to that location. For example, the command cd /home/user/documents will change the current working directory to the "documents" folder located within the "user" folder in the root directory. If you use cd command without any argument it will take you to your home directory. Basic cd Command Usage Here are the most common ways to use the cd command − ...
Read More