Showing headlines posted by linuxer
« Previous ( 1 2 3 4 5 6 7 8 9 10 11 ... 33 ) Next »Understanding the ls Command with a Long Listing Format Output and Permission Bits
The ls command is one of the most frequently used commands in Linux and Unix-like operating systems. It lists the contents of a directory, and when used with various options, it can provide detailed information about files, including permissions, ownership, size, and modification dates. This article delves into the ls command’s long listing format output and how to interpret permission bits.
How to Switch Between Python Versions on Fedora Linux
Switching between different versions of Python on Fedora Linux can be essential for various development environments and projects. With multiple versions of Python available, it’s important to manage them effectively to ensure compatibility and functionality across different projects. This guide will walk you through the process of switching between Python versions on Fedora Linux in a detailed, step-by-step manner.
How to Check and Change the Default Runlevel (target) on Ubuntu Linux
Understanding and managing runlevels is an essential skill for Linux administrators. Runlevels determine the state of the machine after booting, such as whether it starts with a graphical interface or in a multi-user mode. This article provides a comprehensive guide on how to check and change the default runlevel in Ubuntu Linux.
How to manage files on cloud storage with Rclone on Linux
Rclone is a free and open source command line program to manage files on cloud storage services like Google Drive, Backblaze B2, Amazon S3, and many more. The application is written in the Go programming language, and its source code is hosted on GitHub. In this tutorial we learn how to install Rclone on the most used Linux distributions, and how to perform basics operations like copying, syncing, moving and deleting data. In the process, we also see how to obtain Google Drive API credentials, and how to configure a Google Drive remote for Rclone.
How to List All Files Installed by an RPM Package
In this article, we will discuss how to list all files installed by an RPM package on a Red Hat Enterprise Linux (RHEL) system. RPM (Red Hat Package Manager) is a powerful package management system used by RHEL and other RPM-based distributions. Understanding how to list the files provided by an RPM package can be particularly useful for system administrators and users who need to verify the contents of installed packages or troubleshoot issues related to package files.
How to count number of columns in CSV file using bash shell
Counting the number of columns in a CSV file is a common task that can be easily accomplished using various tools available in the Bash shell. In this article, we will explore five different methods to achieve this. Each method will utilize different command-line tools and techniques, giving you a comprehensive understanding of how to handle CSV files in a Bash environment.
Using OpenSSL to Encrypt Messages and Files on Linux
Encryption is a crucial aspect of cybersecurity, ensuring that sensitive information remains confidential and secure from unauthorized access. OpenSSL, a robust open-source implementation of the SSL and TLS protocols, provides various cryptographic functions that can be used to encrypt messages and files on Linux systems. This article will guide you through several methods to achieve this, highlighting the flexibility and power of OpenSSL in securing your data.
How to write and perform Ubuntu unattended installations with autoinstall
Being able to provision and create replicable installations of an operating system is crucial, especially in corporate environments. To perform unattended installations, Ubuntu used to support Debian preseed and Kickstart files. Starting with Ubuntu server 20.04, and version 23.04 of the Ubuntu desktop, those installation methods became deprecated, and the distribution adopted a new autoinstall format, which takes advantage of cloud-init.
How to extract XZ compressed archive on Linux
XZ is a widely used compression format that provides high compression ratios. It is commonly used for compressing files in Linux environments due to its efficiency and compatibility. Extracting XZ compressed archives on Linux can be accomplished using various command-line tools. In this article, we will guide you through the detailed steps of extracting XZ compressed files on a Linux system.
How to use a command line random password generator PWGEN on Linux
The pwgen command in Linux is a powerful and flexible tool used for generating random passwords. It offers various options to customize the passwords according to different requirements, such as length, inclusion of symbols, avoidance of ambiguous characters, and more. This article will guide you through the usage of pwgen and demonstrate how to leverage its options to generate secure and tailored passwords for your needs.
How install and configure a restic REST server on Linux
Restic is an efficient and modern deduplicating backup system which supports encryption; it is able to store backups locally and remotely, via an SFTP connection or on one of the many supported storage platforms, such as Amazon S3 buckets and Google Cloud storage. By using the restic REST backend API, it is also possible to push backups using the HTTP or HTTPS protocols to a remote server which implements the restic REST API.
Automating Security Audits with Lynis on Linux Systems
A paramount aspect of Linux administration is system security. Once we have a certain number of software packages, settings, and user accounts on our system, the task of securing every facet of the system can quickly become overwhelming. This is why it is important to employ a script such as Lynis, which will check tons of different areas of the system for security flaws or potential attack surfaces that malicious programs or users may be able to take advantage of.
How to check Raspberry Pi Java versions
Java can be an important component of a Raspberry Pi system for users that need to run programs that have been compiled with Java, or for developers that wish to code applications in Java. Since Java is constantly being developed, new versions are released and we may find that our Raspberry Pi needs to update to the latest version available, or download an older version for increased stability and legacy features. In this situation, we can install multiple versions of Java and then switch between them as needed.
Advanced Firewall Management with nftables: Transitioning from iptables
nftables is the successor to iptables on Linux systems, and has since become the default firewall. If you have not yet transitioned over to nftables, you are missing out on improved performance, easier command syntax, and an overall simpler way to manage firewall rules. In this tutorial, you will learn how to transition to nftables from iptables. To do so, we must become familiar with how nftables differs from iptables from a functional standpoint, as well as the new command syntax for configuring rules.
Using Logwatch for Basic Security Monitoring on Linux
Linux systems write a lot of information to log files. Typically, each system service you install will have its own log file or set of log files. This is in addition to all of the default logs that get generated, such as those from dmesg, boot log, the package manager log, etc. Inside of these files, it is common to see thousands of entries over a very small span of time.
How to Find the Fastest Debian Mirror for Your sources.list
Finding the fastest Debian mirror can significantly improve the speed of package installations and updates. This is where netselect-apt shines, a handy tool for Debian users that automates the process of selecting the quickest server based on network latency and bandwidth. By using this tool, you can ensure that your system updates and installs packages as efficiently as possible.
How to create a new subdirectory with a single command on Linux
This article explains how to create a new sub-directory in Linux using the mkdir command. Whether you are a beginner or an experienced user, understanding this basic file system operation is essential for managing directories and organizing files effectively.
Practical Examples: Understanding and Using the Sudo Command in Linux
This tutorial will guide you through the basics of the sudo command, which enables a permitted user to execute a command as the superuser or another user, as specified by the security policy in the sudoers file. We’ll explore not only the installation and basic usage of sudo but also dive into configuring detailed permissions through the sudoers file, ensuring both flexibility and security in administrative operations.
How to embed documentation in Bash scripts
Documenting how an application works, its purpose, and its intended usage is really important, even if it is just a simple shell script we are talking about. To ease code maintenance in the most basic cases, documentation can be embed directly inside scripts. In this tutorial we learn how to include Pearl’s Plain Old Documentation syntax (POD) in bash scripts, and how to convert it to various formats using pod2 utilities such as pod2man and pod2html.
How to start a docker container as daemon process
Running Docker containers in the background is essential when deploying applications that should operate continuously without binding directly to the terminal session. This tutorial explores how to start and manage Docker containers in daemon mode, which allows them to run as background processes.