Satish Kumar

Satish Kumar

937 Articles Published

Articles by Satish Kumar

Page 32 of 94

How to Enable and Disable Root Login in Ubuntu?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 27K+ Views

Root login is the ultimate level of access on any Linux system, including Ubuntu. As an Ubuntu user, it's essential to know how to enable or disable root login, as it can impact the overall security of your system. This article will guide you through the process of enabling and disabling root login on Ubuntu. What is Root Login? In Ubuntu, the root account is the administrative account that has complete control over the system. By default, Ubuntu disables root login and encourages the use of sudo, a command that allows users to execute administrative tasks without logging ...

Read More

How to Explore Linux with Installed Help Documentations and Tools?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 343 Views

Linux is an open-source operating system that has become increasingly popular since its development by Linus Torvalds in 1991. Unlike proprietary operating systems, Linux is free to use, modify, and distribute. Its numerous benefits, including flexibility, security, and stability, make it a preferred choice for developers and users worldwide. Understanding the Basics of Linux Linux Operating System Overview Linux is a Unix-like operating system that shares many similarities with Unix, developed in the 1970s. While it uses a command-line interface, many modern distributions also include graphical user interfaces. The Linux kernel manages hardware resources such as memory, ...

Read More

Copying SSH Keys to different Linux Machine

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 708 Views

When working with multiple Linux machines, you often need to copy your SSH keys between systems to enable password-less authentication. This process involves securely transferring your public key from one machine to another and properly configuring the target machine to accept your key for authentication. SSH keys consist of a private key (kept secret on your local machine) and a public key (shared with remote machines). The public key is added to the target machine's authorized_keys file, allowing secure authentication without passwords. SSH Key Structure On your local machine, SSH keys are stored in the .ssh directory ...

Read More

How to Enable and Monitor PHP-FPM Status in Nginx?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 4K+ Views

PHP-FPM (FastCGI Process Manager) is a popular implementation of PHP that provides significant performance improvements over traditional PHP implementations. When combined with Nginx, it creates a powerful web server stack for high-traffic applications. The built-in status monitoring capabilities of PHP-FPM allow administrators to track process health and performance in real-time. Enabling PHP-FPM Status Page PHP-FPM includes a built-in status page that provides real-time information about process states, memory usage, and request statistics. To enable this feature, first locate and edit the PHP-FPM pool configuration file. Step 1: Configure PHP-FPM Pool Open the PHP-FPM pool configuration file. ...

Read More

How to Export a PostgreSQL Table to CSV?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 6K+ Views

PostgreSQL is a powerful open-source relational database management system that provides various features including data export capabilities. One of the most common export formats is CSV (Comma-Separated Values), which allows easy data exchange between different applications and systems. CSV is a simple file format where each row represents a record and fields are separated by commas. The first row typically contains column headers, making the data structure clear and readable. Importance of Exporting PostgreSQL Tables to CSV Exporting PostgreSQL tables to CSV format offers several advantages − Data Sharing − Share data with team members ...

Read More

Find last Directory or file from a given path

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 840 Views

Extracting the last directory or file name from a given path is a common task in shell scripting and Linux command-line operations. For example, from the path /tmp/dir/target, we want to extract target as the final component. While this seems straightforward, there are several edge cases that can cause simple solutions to fail, such as trailing slashes, root directory paths, and filenames containing spaces. Common Solutions Since Linux filesystems use forward slashes (/) as path separators and don't allow slashes in filenames, we can treat the path as slash-separated components and extract the last non-empty element. ...

Read More

Connecting From Docker Containers to Resources in Host

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 3K+ Views

Docker containers are isolated environments that run applications separately from the host system. While this isolation provides security and consistency, there are legitimate scenarios where containers need to access host resources such as databases, files, or services. This article explores various methods to establish connectivity between Docker containers and host system resources. Host Network Access The simplest approach is to configure containers to use the host network directly. This removes network isolation and allows the container to access all host services as if running natively on the host. docker run --network=host my-container Use case: ...

Read More

How to End Processes With kill, pkill, and killall

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 4K+ Views

When working with a Unix-based operating system such as Linux or macOS, it is common to encounter situations where a process becomes unresponsive or needs to be terminated for some reason. Fortunately, there are several command-line utilities available that allow users to end processes in a variety of ways. In this article, we will explore three of the most commonly used utilities for terminating processes: kill, pkill, and killall. We will cover their basic usage, common options, and examples of how they can be used to manage processes on a Unix system. Basic Usage of kill, pkill, and killall ...

Read More

How to Enable and Use firewalld on CentOS 7?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 248 Views

Firewalld is a dynamic firewall management tool for CentOS 7 that provides a user-friendly interface to configure and manage firewall rules. Unlike traditional iptables, firewalld supports network zones and allows changes without restarting the entire firewall service. This article demonstrates how to enable and effectively use firewalld on CentOS 7. Installation and Setup Firewalld is included with CentOS 7 but may not be enabled by default. First, check if firewalld is installed and running − sudo systemctl status firewalld To enable and start the firewalld service − sudo systemctl enable firewalld sudo ...

Read More

How to Extract or Unzip tar.gz Files from Linux Command Line?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 16K+ Views

Tar.gz files, also known as "tarballs, " are compressed archive files commonly used in Linux and Unix-based operating systems. A tarball contains one or more files or directories compressed using the gzip algorithm, significantly reducing file size. They serve two main purposes: efficient data transfer between systems and storage of file backups in a single, manageable archive. Understanding the Linux Command Line The Linux command line interface (CLI) provides a powerful text-based method for interacting with your system. To access the terminal, press Ctrl+Alt+T or find it in your applications menu. Once open, you'll see a prompt like ...

Read More
Showing 311–320 of 937 articles
« Prev 1 30 31 32 33 34 94 Next »
Advertisements