Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Satish Kumar
Page 23 of 94
Cross compile Static Library from Linux for windows
When developing software, there is a high chance that software might be used in various operating systems. Therefore, it is important to build software in a cross-platform manner to ensure compatibility with multiple operating systems. In this article, we will focus on cross-compiling static libraries from Linux for Windows. What is a Static Library? A static library is a file that contains pre-compiled code that can be linked with an executable program to create a single, self-contained executable. The code in a static library is linked directly into the executable, which makes it faster and more efficient than ...
Read More8 Best PuTTY Alternatives
If you've worked with Linux or other Unix-like operating systems, you've probably used PuTTY at some point. PuTTY is a free and open-source terminal emulator that allows you to connect to remote systems using various protocols such as SSH, Telnet, and Rlogin. While PuTTY is a popular choice, there are other terminal emulators available that can provide additional features and customization options. In this article, we'll explore eight of the best PuTTY alternatives and what makes them stand out. Top PuTTY Alternatives 1. Terminator Terminator is an open-source terminal emulator that provides split windows and tabs, allowing ...
Read MoreHow to Delete Iptables Rule?
Iptables is a powerful firewall tool built into Linux kernel-based operating systems that acts as a packet filter, monitoring and controlling network traffic based on predefined rules. As a system administrator, understanding how to delete iptables rules is crucial for maintaining and modifying firewall configurations when network requirements change. Understanding Iptables Rules Iptables works by analyzing incoming and outgoing data packets against a set of rules that determine whether traffic should be allowed, blocked, or forwarded. Each rule contains criteria such as source/destination IP addresses, ports, protocols, and actions to take when packets match those criteria. When ...
Read MoreDifference Between .bashrc, .bash-profile, and .profile
When working with the command line on Unix or Linux systems, three configuration files play crucial roles in setting up your shell environment: .bashrc, .bash_profile, and .profile. Understanding when and how these files are executed is essential for effective shell customization and environment management. How Shell Configuration Files Work These files contain shell commands that are automatically executed at specific times during shell initialization. The key difference lies in when they are executed: Login shells − Started when you log into the system (SSH, console login) Non-login shells − Started when you open a new terminal ...
Read MoreHow to Delete Line in Vim on Linux?
Vim (Vi IMproved) is one of the most popular text editors used in the Linux environment. It is a command-line based editor that was initially developed as a free and open-source alternative to the widely-used Vi editor. However, Vim has evolved to be much more than just an alternative. It has become an indispensable tool for programmers, system administrators, and power users who work with text files regularly. One of the primary reasons why Vim is so important for Linux users is its efficiency and flexibility. Unlike traditional graphical user interface (GUI) editors, Vim focuses on quick navigation and ...
Read MoreHow to Create a crontab Through a Script on Linux
Creating a crontab through a script on Linux is a simple and efficient way to automate repetitive tasks and schedule them to run at specific intervals. This article explores how to create and manage crontab entries through scripts, including practical examples and troubleshooting tips. What is a Crontab? A crontab (cron table) is a configuration file that specifies shell commands to run periodically on a given schedule. The cron daemon reads these files and executes commands at the specified times. Each user can have their own crontab file, making it useful for tasks such as running backups, sending ...
Read MoreHow to align 3 files based on first column value
When working with data analysis, it is often necessary to align multiple files based on a shared column. This process involves combining data from different sources using a common identifier, typically found in the first column. File alignment is essential for creating comprehensive datasets that can be analyzed effectively. Why Align Multiple Files? In data analysis, we frequently encounter situations where related information is stored across separate files. Aligning these files based on a common column allows us to: Combine data from multiple sources for comprehensive analysis Detect errors and inconsistencies across datasets Create unified reports ...
Read MoreString Manipulation in Bash on Linux
Bash is a shell language used in Linux systems that allows users to interact with the system through a command-line interface. Bash offers several string manipulation capabilities that can help users manipulate and process text strings effectively. Basic String Operations Bash provides fundamental operations for manipulating strings. To create a string variable in Bash, you simply assign a value to a variable name − mystring="Hello, world!" To display contents of a string variable, you can use the echo command − echo $mystring The output will be − Hello, ...
Read MoreHow to Delete Old Unused Kernels in CentOS, RHEL and Fedora?
Kernel management is a crucial system administration task in CentOS, RHEL, and Fedora. When you install kernel updates, the old versions are kept as a safety measure, but over time these can accumulate and consume valuable disk space, potentially causing boot issues or system slowdowns. Removing old unused kernels frees up disk space, reduces boot menu clutter, and eliminates potential security vulnerabilities in outdated kernel versions. However, it's important to always keep at least one or two recent kernels as backup in case the current kernel encounters issues. Checking the Current Kernel Version Before removing any kernels, ...
Read MoreWhy Should We Disable Root-login over SSH on Linux
Root-login over SSH is a common method for gaining access to a Linux server, but it poses significant security risks. In this article, we will explore the reasons why disabling root-login over SSH is a critical security practice, and provide step-by-step examples of how to implement this safeguard. What is Root-Login Over SSH? When a Linux server is set up, the root user is created by default. The root user is the most powerful user on the system, with unrestricted privileges to perform any task, including making changes to system configuration, installing software, creating users, and accessing all ...
Read More