Showing headlines posted by linuxer
« Previous ( 1 2 3 4 5 6 7 8 9 10 11 ... 35 ) Next »How to Encrypt and Decrypt Files and Directories Using OpenSSL and Linux
Encrypting and decrypting files and directories securely is essential for protecting sensitive data. OpenSSL, a powerful open-source tool, provides robust encryption and decryption capabilities that can handle files of any size, from small text files to large binaries, and even entire directories.
How to Obtain Information About Network Devices and Their Configuration on Linux
Linux is a powerful operating system that provides a wide range of tools for network management and configuration. Whether you are troubleshooting network issues, configuring new devices, or just exploring your system’s network setup, knowing how to obtain information about network devices is essential.
How to Transfer Data Over the Network with nc (netcat) Command on Linux
The nc (netcat) command is a versatile tool that allows Linux users to transfer data over a network. This method can be useful for quickly moving files between systems without needing additional data transfer protocols like FTP, HTTP, or SCP. In this tutorial, you will learn how to transfer a file between two Linux systems using nc, with one system acting as the server (sending the file) and the other as the client (receiving the file).
How to Convert Various eBook Formats for Amazon Kindle on Linux
Amazon Kindle supports a limited number of eBook formats, making it essential to convert your files to a compatible format before sending them to your device. If you are a Linux user, there are several tools at your disposal to help with this conversion process. In this guide, we will cover how to use popular tools such as ebook-convert, calibre, and unoconv to convert various eBook formats to Amazon Kindle-supported formats.
How to Execute Less Than 1 Minute Interval Jobs
When working with the Cron time-based scheduler in Linux, you might find yourself needing to execute tasks at intervals of less than one minute. However, the native capabilities of Cron do not allow for such granular scheduling. By default, Cron’s smallest interval is one minute. This can be limiting for certain applications where tasks need to be run every few seconds or at a more precise time interval.
How to install Kali alongside Windows 11 (Dual Boot)
Security professionals often need to use a variety of operating systems to perform their tasks. Dual booting Kali Linux and Windows 11 grants users the ability to switch back and forth between systems, depending on the work that needs done.
Ubuntu Remote Desktop Access from Windows 10/11
Remote desktop is a feature that allows a user to log into another system and control it the same way they would if they were sitting right in front of it. You are able to see the screen exactly as it appears on the remote system itself, and use the keyboard and mouse.
How to create backups with Rsnapshot on Linux
Rsnapshot is a free and open source utility which works as a wrapper around Rsync to perform incremental snapshots of local or remote systems via SSH. Hard links are used to save space when backing up unchanged files, to preserve space while still displaying complete filesystems to the user. In this tutorial, we learn how to install and configure Rsnapshot on some of the most used Linux distributions.
How to install Ubuntu alongside Windows 11 (Dual Boot)
If you want to be able to run both Ubuntu Linux and Windows 11 on your PC, one option is to implement a dual boot configuration. This will give you the best of both worlds by allowing you to boot into either Ubuntu or Windows 11 whenever you turn on your computer. Having access to both operating systems is a powerful option in which you can take advantage of both system’s abilities.
Encrypting and Decrypting Files and Directories on Linux Using mcrypt command
Encryption is a crucial aspect of securing sensitive information on your Linux system. One of the tools you can use for this purpose is mcrypt, which provides symmetric encryption and decryption capabilities. This guide will walk you through the process of using mcrypt to encrypt and decrypt files and directories on Linux, covering a range of options and examples.
How to Substitute Only the First Match Occurrence Using the Sed Command
The sed command, short for stream editor, is a powerful tool in Unix and Linux systems used for parsing and transforming text. One of the common tasks performed with sed is substitution, where you replace occurrences of a specific pattern within a file or a stream.
Copying Files and Directories While Preserving SELinux Context on Linux
Security-Enhanced Linux (SELinux) is a powerful security module that provides mechanisms for supporting access control security policies. When managing files and directories on a SELinux-enabled system, it’s crucial to preserve their SELinux context to maintain their security properties. This article will guide you through the steps to copy files and directories while preserving their SELinux context on a Linux system.
Setting Up a WebDAV Server on Ubuntu and Debian
Web Distributed Authoring and Versioning (WebDAV) allows users to collaboratively edit and manage files on remote web servers. This guide will walk you through the installation and configuration of a WebDAV server on Ubuntu and Debian using Apache2.
The Rise of Ethical Hackers: Securing Systems in a Digital World
In our modern, digital age, the security of computer systems is paramount. Ethical hackers are skilled professionals who test these systems, networks, and applications, searching playfully for weaknesses and vulnerabilities that criminal hackers might exploit. This field of cybersecurity has been growing rapidly, with the number of job openings for ethical hackers consistently surpassing the supply of qualified professionals.
How to Exclude Directories from the Find Command Search in Linux
In this article, we will delve into the methods for explicitly excluding directories from the find command‘s search in Linux. The find command is a powerful utility for searching for files and directories within a directory hierarchy. However, there are scenarios where you may want to exclude certain directories from your search to speed up the process or to avoid irrelevant results. We’ll explore different options and provide practical examples using a sandbox directory structure.
Mastering dd Command: Comprehensive Guide with Practical Examples
What you’re reading is only the first of many articles from the “Learning Linux Commands” series. Why would we want to do such a thing? Because it’s useful to have every option and possible use of a widely used command all in one place.
How to Convert Documents Between LibreOffice and Microsoft Office File Formats on Linux
Converting documents between LibreOffice and Microsoft Office file formats can be essential for ensuring compatibility and ease of access across different platforms and software suites. On Linux, several methods and tools are available to facilitate this conversion process, enabling users to switch seamlessly between file formats without losing data integrity or formatting.
How to List, Import, and Remove Archive Signing Keys on CentOS
In this tutorial, we will explore how to manage archive signing keys on CentOS. Archive signing keys are crucial for ensuring the integrity and authenticity of software packages installed on your system.
How to install the Zed code editor on Linux
Zed is a high-performance, “multiplayer”, free and open source code editor written in Rust and developed in the open on GitHub. It was created by the same authors as the Atom text editor, and although it has IDE features, it is very responsive. In this tutorial, we learn how to install Zed on some of the most used Linux distributions.
How to enable/disable firewall on Ubuntu Linux
The default firewall on Ubuntu is ufw, which is short for “uncomplicated firewall.” Ufw is a frontend for the typical Linux iptables commands, but it is developed in such a way that basic firewall tasks can be performed without the knowledge of iptables.