Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Satish Kumar
Page 33 of 94
How to Deploy RedHat Enterprise Virtualization Hypervisor (RHEV-H)
RedHat Enterprise Virtualization Hypervisor (RHEV-H) is a bare-metal hypervisor based on the open-source Kernel-based Virtual Machine (KVM) technology. It provides hardware-based virtualization that enables multiple operating systems to run efficiently on a single physical server, creating a scalable and cost-effective virtualization infrastructure for modern data centers. System Requirements Before deploying RHEV-H, ensure your system meets these minimum requirements: Processor − 64-bit x86 processor with virtualization extensions (Intel VT or AMD-V) Memory − At least 4 GB of RAM for the hypervisor Storage − Minimum 10 GB disk space for installation Network − Network interface controller supporting ...
Read MoreDelete empty files and directories in Linux
Empty files and directories in Linux systems don't consume significant disk space, but removing them periodically helps maintain system cleanliness and organization. This tutorial covers various methods to delete empty files and directories using the powerful find command in Linux systems. Delete Empty Files in a Directory The find command with specific options can locate and remove all empty files in a directory structure. The basic syntax combines type filtering, empty file detection, and deletion in one command. find . -type f -empty -print -delete Let's examine this command with a practical example. Consider ...
Read MoreCommand Substitution in Bourne Shell
Command substitution is one of the most powerful features of the Bourne shell, allowing you to capture the output of one command and use it as an argument or input to another command. This mechanism enables complex command chaining and automation in Unix and Linux systems. What is Command Substitution? Command substitution allows you to execute a command and replace the command with its output. The Bourne shell provides two syntaxes for command substitution: `command` or the modern preferred syntax: $(command) The $(command) syntax is recommended because it's more readable, ...
Read MoreHow to Enable Apache Userdir Module on RHEL/CentOS?
If you are running a web server with Apache on RHEL/CentOS, you may need to enable the Userdir module to allow users to create and serve their own web content. The Userdir module enables users to access their own web directories using a URL format like http://example.com/~username. Enabling the Apache Userdir module on RHEL/CentOS is a straightforward process that involves installation, configuration, and security considerations. This article will guide you through the complete setup process. Prerequisites and Installation Step 1: Install Apache Web Server Before enabling the Userdir module, ensure Apache web server is installed on ...
Read MoreHow to File a Software Bug to Fedora?
If you are a software user or developer, you have likely encountered a software bug at some point. A software bug is an error or flaw in a computer program that causes it to produce unintended or incorrect results. These bugs can range from minor nuisances to major issues that cause programs to crash, and they can occur in any software application regardless of its complexity. Fedora is a popular open-source operating system that is used by millions of people around the world. It is known for its stability, security, and cutting-edge features, making it a favorite among developers ...
Read MoreAvoiding unwanted directory while using zip
ZIP files are one of the most widely supported compression formats, especially when sharing files across different operating systems like Linux, Windows, and Mac. However, when creating ZIP archives from the command line, we often encounter the problem of unwanted directory structures that make the extracted files difficult to navigate. This article explores techniques to create clean ZIP archives without unnecessary parent directories, using Linux command-line tools and bash built-in commands like pushd and popd. The Problem with Full Path Compression When using the zip command with the -r (recursive) option, the entire directory path gets included ...
Read MoreCombine and Execute Multiple Linux Commands
Linux is a powerful and versatile operating system that has gained immense popularity in the computing world. One of the most useful features of Linux is the ability to combine and execute multiple commands at once, which can significantly improve your productivity and efficiency. In this article, we will discuss various techniques for combining and executing multiple Linux commands, along with examples that demonstrate their practical applications. Combining Commands with Pipes The most common way to combine Linux commands is by using pipes. A pipe is a feature that allows the output of one command to be ...
Read More20 Things to Do After Fresh Installation of Fedora 26 Workstation
Fedora 26 Workstation is an operating system built on the Linux kernel, which provides users with a highly customizable, secure, and powerful computing experience. It is designed to cater to developers, system administrators, and users who want to leverage the latest technologies and features. If you have just installed Fedora 26 Workstation, here are 20 essential things you can do to make the most of your new installation. 1. Update Your System After installing Fedora 26, the first thing you should do is update your system. This ensures you have the latest packages and security patches. ...
Read MoreHow to Find All Failed SSH login Attempts in Linux?
As a Linux system administrator, monitoring failed SSH login attempts is crucial for maintaining system security. SSH (Secure Shell) is the primary method for remote access to Linux systems, making it a common target for attackers. Every SSH login attempt, whether successful or failed, is recorded in system logs, providing valuable security intelligence. Failed SSH login attempts often indicate brute-force attacks, where attackers use automated scripts to guess passwords, or compromised user accounts. By analyzing these logs regularly, you can identify unauthorized access attempts and implement protective measures before a breach occurs. Understanding SSH Login Logs SSH ...
Read MoreImplement shell file protection in Linux
Shell file protection in Linux provides multiple layers of security to prevent accidental file overwrites and unauthorized access. This includes both filesystem permissions and built-in shell safeguards like the noclobber option that prevents redirection operators from overwriting existing files. Besides the Linux file permission mechanisms that help us keep our files safe from misuse, most Linux shells have built-in safeguards against accidental file overwrite. We'll cover the key protection mechanisms available in common shells. Protecting Files With noclobber All POSIX shell implementations support the noclobber option. When enabled, the shell prevents output redirection operators from overwriting existing ...
Read More