Showing headlines posted by linuxer

« Previous ( 1 ... 4 5 6 7 8 9 10 11 12 13 14 ... 36 ) Next »

How to Create a File-Based Filesystem Using dd Command on Linux

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on Jun 4, 2024 9:22 PM CST)
  • Story Type: Tutorial; Groups: Linux
Creating a file-based filesystem on Linux using the dd command is a useful technique for testing, development, or creating isolated storage environments without partitioning your physical disks. This tutorial will guide you through each step in detail, explaining the purpose and the commands involved.

How to Insert a Line at the Beginning of a File on Linux

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on Jun 3, 2024 9:55 PM CST)
  • Story Type: Tutorial; Groups: Linux
In Linux, modifying files from the command line is a common task. Whether you need to prepend configuration parameters, add headers to text files, or make bulk edits, knowing how to insert a line at the beginning of a file can be very useful. This article explores several methods to achieve this efficiently.

SSH Tunnels: Secure Remote Access and Port Forwarding

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on Jun 3, 2024 5:37 PM CST)
  • Story Type: Tutorial; Groups: Linux
SSH is a communication protocol that allows us to access remote hosts and securely transfer data over unsecure networks, thanks to encrypted connections. By using the SSH tunneling technique, we can forward TCP traffic from and to a local machine, bypassing firewall restrictions. In this tutorial, we learn the difference between local and remote SSH tunnels, and how to create them.

How to Clone Permissions from Another File or Directory on Linux

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on May 31, 2024 10:06 PM CST)
  • Story Type: Tutorial; Groups: Linux
In this article, we will explore how to clone permissions from one file or directory to another on a Linux system. This is a common task that can save time and ensure consistency across your file system. By using a few simple commands, you can easily duplicate the permissions of any file or directory to another, maintaining the desired access control settings.

Self-Host Immich: Open Source Google Photos Alternative

  • linuxconfig.org; By Egidio Docile (Posted by linuxer on May 31, 2024 5:16 PM CST)
  • Story Type: Tutorial; Groups: Linux
Immich is a free and open source alternative to Google Photos, with a focus on privacy. Both the server software and the mobile client application, are developed in the open on GitHub. Thanks to the container technology, deploying a private, self-hosted instance of Immich is quite easy. In this tutorial, we learn how to run a self-hosted Immich instance using Docker, to manage and backup our photos and videos.

How to Extract Files from an RPM Package Archive

RPM (Red Hat Package Manager) is a package management system used primarily in Red Hat-based distributions like RHEL, CentOS, and Fedora. Sometimes, you may need to extract files from an RPM package without installing it, either for inspection or to use certain files in a different context. This article will guide you through the steps to extract files from an RPM package archive.

Understanding the ls Command with a Long Listing Format Output and Permission Bits

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on May 30, 2024 10:08 PM CST)
  • Story Type: Tutorial; Groups: Linux
The ls command is one of the most frequently used commands in Linux and Unix-like operating systems. It lists the contents of a directory, and when used with various options, it can provide detailed information about files, including permissions, ownership, size, and modification dates. This article delves into the ls command’s long listing format output and how to interpret permission bits.

How to Switch Between Python Versions on Fedora Linux

Switching between different versions of Python on Fedora Linux can be essential for various development environments and projects. With multiple versions of Python available, it’s important to manage them effectively to ensure compatibility and functionality across different projects. This guide will walk you through the process of switching between Python versions on Fedora Linux in a detailed, step-by-step manner.

How to Check and Change the Default Runlevel (target) on Ubuntu Linux

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on May 29, 2024 6:09 AM CST)
  • Story Type: Tutorial; Groups: Ubuntu
Understanding and managing runlevels is an essential skill for Linux administrators. Runlevels determine the state of the machine after booting, such as whether it starts with a graphical interface or in a multi-user mode. This article provides a comprehensive guide on how to check and change the default runlevel in Ubuntu Linux.

How to manage files on cloud storage with Rclone on Linux

  • linuxconfig.org; By Egidio Docile (Posted by linuxer on May 27, 2024 3:27 AM CST)
  • Story Type: Tutorial; Groups: Cloud, Linux
Rclone is a free and open source command line program to manage files on cloud storage services like Google Drive, Backblaze B2, Amazon S3, and many more. The application is written in the Go programming language, and its source code is hosted on GitHub. In this tutorial we learn how to install Rclone on the most used Linux distributions, and how to perform basics operations like copying, syncing, moving and deleting data. In the process, we also see how to obtain Google Drive API credentials, and how to configure a Google Drive remote for Rclone.

How to List All Files Installed by an RPM Package

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on May 25, 2024 7:00 AM CST)
  • Story Type: Tutorial; Groups: Red Hat
In this article, we will discuss how to list all files installed by an RPM package on a Red Hat Enterprise Linux (RHEL) system. RPM (Red Hat Package Manager) is a powerful package management system used by RHEL and other RPM-based distributions. Understanding how to list the files provided by an RPM package can be particularly useful for system administrators and users who need to verify the contents of installed packages or troubleshoot issues related to package files.

How to count number of columns in CSV file using bash shell

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on May 24, 2024 5:18 PM CST)
  • Story Type: Tutorial; Groups: Developer
Counting the number of columns in a CSV file is a common task that can be easily accomplished using various tools available in the Bash shell. In this article, we will explore five different methods to achieve this. Each method will utilize different command-line tools and techniques, giving you a comprehensive understanding of how to handle CSV files in a Bash environment.

Using OpenSSL to Encrypt Messages and Files on Linux

Encryption is a crucial aspect of cybersecurity, ensuring that sensitive information remains confidential and secure from unauthorized access. OpenSSL, a robust open-source implementation of the SSL and TLS protocols, provides various cryptographic functions that can be used to encrypt messages and files on Linux systems. This article will guide you through several methods to achieve this, highlighting the flexibility and power of OpenSSL in securing your data.

How to write and perform Ubuntu unattended installations with autoinstall

  • linuxconfig.org; By Egidio Docile (Posted by linuxer on May 22, 2024 4:21 AM CST)
  • Story Type: Tutorial; Groups: Ubuntu
Being able to provision and create replicable installations of an operating system is crucial, especially in corporate environments. To perform unattended installations, Ubuntu used to support Debian preseed and Kickstart files. Starting with Ubuntu server 20.04, and version 23.04 of the Ubuntu desktop, those installation methods became deprecated, and the distribution adopted a new autoinstall format, which takes advantage of cloud-init.

How to extract XZ compressed archive on Linux

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on May 18, 2024 2:06 PM CST)
  • Story Type: Tutorial; Groups: Linux
XZ is a widely used compression format that provides high compression ratios. It is commonly used for compressing files in Linux environments due to its efficiency and compatibility. Extracting XZ compressed archives on Linux can be accomplished using various command-line tools. In this article, we will guide you through the detailed steps of extracting XZ compressed files on a Linux system.

How to use a command line random password generator PWGEN on Linux

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on May 17, 2024 5:04 AM CST)
  • Story Type: Tutorial; Groups: Linux
The pwgen command in Linux is a powerful and flexible tool used for generating random passwords. It offers various options to customize the passwords according to different requirements, such as length, inclusion of symbols, avoidance of ambiguous characters, and more. This article will guide you through the usage of pwgen and demonstrate how to leverage its options to generate secure and tailored passwords for your needs.

How install and configure a restic REST server on Linux

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on May 17, 2024 3:00 AM CST)
  • Story Type: Tutorial; Groups: Linux
Restic is an efficient and modern deduplicating backup system which supports encryption; it is able to store backups locally and remotely, via an SFTP connection or on one of the many supported storage platforms, such as Amazon S3 buckets and Google Cloud storage. By using the restic REST backend API, it is also possible to push backups using the HTTP or HTTPS protocols to a remote server which implements the restic REST API.

Automating Security Audits with Lynis on Linux Systems

A paramount aspect of Linux administration is system security. Once we have a certain number of software packages, settings, and user accounts on our system, the task of securing every facet of the system can quickly become overwhelming. This is why it is important to employ a script such as Lynis, which will check tons of different areas of the system for security flaws or potential attack surfaces that malicious programs or users may be able to take advantage of.

How to check Raspberry Pi Java versions

Java can be an important component of a Raspberry Pi system for users that need to run programs that have been compiled with Java, or for developers that wish to code applications in Java. Since Java is constantly being developed, new versions are released and we may find that our Raspberry Pi needs to update to the latest version available, or download an older version for increased stability and legacy features. In this situation, we can install multiple versions of Java and then switch between them as needed.

Advanced Firewall Management with nftables: Transitioning from iptables

nftables is the successor to iptables on Linux systems, and has since become the default firewall. If you have not yet transitioned over to nftables, you are missing out on improved performance, easier command syntax, and an overall simpler way to manage firewall rules. In this tutorial, you will learn how to transition to nftables from iptables. To do so, we must become familiar with how nftables differs from iptables from a functional standpoint, as well as the new command syntax for configuring rules.

« Previous ( 1 ... 4 5 6 7 8 9 10 11 12 13 14 ... 36 ) Next »