Satish Kumar

Satish Kumar

937 Articles Published

Articles by Satish Kumar

Page 23 of 94

Cross compile Static Library from Linux for windows

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 2K+ Views

When developing software, there is a high chance that software might be used in various operating systems. Therefore, it is important to build software in a cross-platform manner to ensure compatibility with multiple operating systems. In this article, we will focus on cross-compiling static libraries from Linux for Windows. What is a Static Library? A static library is a file that contains pre-compiled code that can be linked with an executable program to create a single, self-contained executable. The code in a static library is linked directly into the executable, which makes it faster and more efficient than ...

Read More

8 Best PuTTY Alternatives

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

If you've worked with Linux or other Unix-like operating systems, you've probably used PuTTY at some point. PuTTY is a free and open-source terminal emulator that allows you to connect to remote systems using various protocols such as SSH, Telnet, and Rlogin. While PuTTY is a popular choice, there are other terminal emulators available that can provide additional features and customization options. In this article, we'll explore eight of the best PuTTY alternatives and what makes them stand out. Top PuTTY Alternatives 1. Terminator Terminator is an open-source terminal emulator that provides split windows and tabs, allowing ...

Read More

How to Delete Iptables Rule?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 5K+ Views

Iptables is a powerful firewall tool built into Linux kernel-based operating systems that acts as a packet filter, monitoring and controlling network traffic based on predefined rules. As a system administrator, understanding how to delete iptables rules is crucial for maintaining and modifying firewall configurations when network requirements change. Understanding Iptables Rules Iptables works by analyzing incoming and outgoing data packets against a set of rules that determine whether traffic should be allowed, blocked, or forwarded. Each rule contains criteria such as source/destination IP addresses, ports, protocols, and actions to take when packets match those criteria. When ...

Read More

Difference Between .bashrc, .bash-profile, and .profile

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 10K+ Views

When working with the command line on Unix or Linux systems, three configuration files play crucial roles in setting up your shell environment: .bashrc, .bash_profile, and .profile. Understanding when and how these files are executed is essential for effective shell customization and environment management. How Shell Configuration Files Work These files contain shell commands that are automatically executed at specific times during shell initialization. The key difference lies in when they are executed: Login shells − Started when you log into the system (SSH, console login) Non-login shells − Started when you open a new terminal ...

Read More

How to Delete Line in Vim on Linux?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 20K+ Views

Vim (Vi IMproved) is one of the most popular text editors used in the Linux environment. It is a command-line based editor that was initially developed as a free and open-source alternative to the widely-used Vi editor. However, Vim has evolved to be much more than just an alternative. It has become an indispensable tool for programmers, system administrators, and power users who work with text files regularly. One of the primary reasons why Vim is so important for Linux users is its efficiency and flexibility. Unlike traditional graphical user interface (GUI) editors, Vim focuses on quick navigation and ...

Read More

How to Create a crontab Through a Script on Linux

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 460 Views

Creating a crontab through a script on Linux is a simple and efficient way to automate repetitive tasks and schedule them to run at specific intervals. This article explores how to create and manage crontab entries through scripts, including practical examples and troubleshooting tips. What is a Crontab? A crontab (cron table) is a configuration file that specifies shell commands to run periodically on a given schedule. The cron daemon reads these files and executes commands at the specified times. Each user can have their own crontab file, making it useful for tasks such as running backups, sending ...

Read More

How to align 3 files based on first column value

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 175 Views

When working with data analysis, it is often necessary to align multiple files based on a shared column. This process involves combining data from different sources using a common identifier, typically found in the first column. File alignment is essential for creating comprehensive datasets that can be analyzed effectively. Why Align Multiple Files? In data analysis, we frequently encounter situations where related information is stored across separate files. Aligning these files based on a common column allows us to: Combine data from multiple sources for comprehensive analysis Detect errors and inconsistencies across datasets Create unified reports ...

Read More

String Manipulation in Bash on Linux

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 3K+ Views

Bash is a shell language used in Linux systems that allows users to interact with the system through a command-line interface. Bash offers several string manipulation capabilities that can help users manipulate and process text strings effectively. Basic String Operations Bash provides fundamental operations for manipulating strings. To create a string variable in Bash, you simply assign a value to a variable name − mystring="Hello, world!" To display contents of a string variable, you can use the echo command − echo $mystring The output will be − Hello, ...

Read More

How to Delete Old Unused Kernels in CentOS, RHEL and Fedora?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 7K+ Views

Kernel management is a crucial system administration task in CentOS, RHEL, and Fedora. When you install kernel updates, the old versions are kept as a safety measure, but over time these can accumulate and consume valuable disk space, potentially causing boot issues or system slowdowns. Removing old unused kernels frees up disk space, reduces boot menu clutter, and eliminates potential security vulnerabilities in outdated kernel versions. However, it's important to always keep at least one or two recent kernels as backup in case the current kernel encounters issues. Checking the Current Kernel Version Before removing any kernels, ...

Read More

Why Should We Disable Root-login over SSH on Linux

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 2K+ Views

Root-login over SSH is a common method for gaining access to a Linux server, but it poses significant security risks. In this article, we will explore the reasons why disabling root-login over SSH is a critical security practice, and provide step-by-step examples of how to implement this safeguard. What is Root-Login Over SSH? When a Linux server is set up, the root user is created by default. The root user is the most powerful user on the system, with unrestricted privileges to perform any task, including making changes to system configuration, installing software, creating users, and accessing all ...

Read More
Showing 221–230 of 937 articles
« Prev 1 21 22 23 24 25 94 Next »
Advertisements