Showing headlines posted by linuxer
« Previous ( 1 ... 3 4 5 6 7 8 9 10 11 12 13 ... 35 ) Next »Bash Scripting: Understanding the Use of Parentheses, Brackets, and Braces
In this tutorial, we will explore the various uses of parentheses, brackets, and braces in BASH scripting. These symbols have distinct functionalities and are crucial for writing effective scripts. Understanding their uses can help you in tasks such as arithmetic operations, test constructs, and parameter expansions.
Using sed and Bash to Fill Empty Cells in a CSV File
Dealing with CSV files containing empty cells can be challenging, especially when trying to process or analyze data programmatically. In this article, we will explore how to use Bash and the powerful text stream editor sed to fill these empty cells efficiently. This approach ensures that your data is complete and ready for further manipulation or analysis.
Internal vs External Linux Shell Commands
Linux commands are an essential part of managing and operating Linux systems, providing users with the ability to perform a wide range of tasks from file manipulation to system monitoring. These commands can be categorized into two types: internal and external commands. Internal commands are built into the shell itself, enabling quick execution without the need for external binaries. In contrast, external commands are separate executable files located in the system’s file hierarchy.
How to Deny/Allow Access to Files Using .htaccess
The .htaccess file is a powerful configuration tool for web servers that use Apache. It allows you to control various aspects of your website, including security settings. One of the critical uses of the .htaccess file is to manage access to files and directories. This article will guide you through the process of using .htaccess to deny or allow access to files based on different criteria, such as IP address, user authentication, and file types.
How to Check a Website Header Using Linux Command Line
Checking the headers of a website can provide valuable information about the server, security policies, and other metadata. This is particularly useful for web developers, system administrators, and security professionals. The Linux command line offers several tools that allow users to inspect website headers easily and efficiently.
How to Disable User Accounts on a Linux System
Disabling user accounts on a Linux system is a common administrative task, often performed to prevent users from accessing the system without completely removing their accounts. This can be necessary for various reasons, such as security concerns, temporary suspensions, or transitioning users to different systems. This guide will walk you through the steps required to disable user accounts effectively and securely.
How to Create a File-Based Filesystem Using dd Command on Linux
Creating a file-based filesystem on Linux using the dd command is a useful technique for testing, development, or creating isolated storage environments without partitioning your physical disks. This tutorial will guide you through each step in detail, explaining the purpose and the commands involved.
How to Insert a Line at the Beginning of a File on Linux
In Linux, modifying files from the command line is a common task. Whether you need to prepend configuration parameters, add headers to text files, or make bulk edits, knowing how to insert a line at the beginning of a file can be very useful. This article explores several methods to achieve this efficiently.
SSH Tunnels: Secure Remote Access and Port Forwarding
SSH is a communication protocol that allows us to access remote hosts and securely transfer data over unsecure networks, thanks to encrypted connections. By using the SSH tunneling technique, we can forward TCP traffic from and to a local machine, bypassing firewall restrictions. In this tutorial, we learn the difference between local and remote SSH tunnels, and how to create them.
How to Clone Permissions from Another File or Directory on Linux
In this article, we will explore how to clone permissions from one file or directory to another on a Linux system. This is a common task that can save time and ensure consistency across your file system. By using a few simple commands, you can easily duplicate the permissions of any file or directory to another, maintaining the desired access control settings.
Self-Host Immich: Open Source Google Photos Alternative
Immich is a free and open source alternative to Google Photos, with a focus on privacy. Both the server software and the mobile client application, are developed in the open on GitHub. Thanks to the container technology, deploying a private, self-hosted instance of Immich is quite easy. In this tutorial, we learn how to run a self-hosted Immich instance using Docker, to manage and backup our photos and videos.
How to Extract Files from an RPM Package Archive
RPM (Red Hat Package Manager) is a package management system used primarily in Red Hat-based distributions like RHEL, CentOS, and Fedora. Sometimes, you may need to extract files from an RPM package without installing it, either for inspection or to use certain files in a different context. This article will guide you through the steps to extract files from an RPM package archive.
Understanding the ls Command with a Long Listing Format Output and Permission Bits
The ls command is one of the most frequently used commands in Linux and Unix-like operating systems. It lists the contents of a directory, and when used with various options, it can provide detailed information about files, including permissions, ownership, size, and modification dates. This article delves into the ls command’s long listing format output and how to interpret permission bits.
How to Switch Between Python Versions on Fedora Linux
Switching between different versions of Python on Fedora Linux can be essential for various development environments and projects. With multiple versions of Python available, it’s important to manage them effectively to ensure compatibility and functionality across different projects. This guide will walk you through the process of switching between Python versions on Fedora Linux in a detailed, step-by-step manner.
How to Check and Change the Default Runlevel (target) on Ubuntu Linux
Understanding and managing runlevels is an essential skill for Linux administrators. Runlevels determine the state of the machine after booting, such as whether it starts with a graphical interface or in a multi-user mode. This article provides a comprehensive guide on how to check and change the default runlevel in Ubuntu Linux.
How to manage files on cloud storage with Rclone on Linux
Rclone is a free and open source command line program to manage files on cloud storage services like Google Drive, Backblaze B2, Amazon S3, and many more. The application is written in the Go programming language, and its source code is hosted on GitHub. In this tutorial we learn how to install Rclone on the most used Linux distributions, and how to perform basics operations like copying, syncing, moving and deleting data. In the process, we also see how to obtain Google Drive API credentials, and how to configure a Google Drive remote for Rclone.
How to List All Files Installed by an RPM Package
In this article, we will discuss how to list all files installed by an RPM package on a Red Hat Enterprise Linux (RHEL) system. RPM (Red Hat Package Manager) is a powerful package management system used by RHEL and other RPM-based distributions. Understanding how to list the files provided by an RPM package can be particularly useful for system administrators and users who need to verify the contents of installed packages or troubleshoot issues related to package files.
How to count number of columns in CSV file using bash shell
Counting the number of columns in a CSV file is a common task that can be easily accomplished using various tools available in the Bash shell. In this article, we will explore five different methods to achieve this. Each method will utilize different command-line tools and techniques, giving you a comprehensive understanding of how to handle CSV files in a Bash environment.
Using OpenSSL to Encrypt Messages and Files on Linux
Encryption is a crucial aspect of cybersecurity, ensuring that sensitive information remains confidential and secure from unauthorized access. OpenSSL, a robust open-source implementation of the SSL and TLS protocols, provides various cryptographic functions that can be used to encrypt messages and files on Linux systems. This article will guide you through several methods to achieve this, highlighting the flexibility and power of OpenSSL in securing your data.
How to write and perform Ubuntu unattended installations with autoinstall
Being able to provision and create replicable installations of an operating system is crucial, especially in corporate environments. To perform unattended installations, Ubuntu used to support Debian preseed and Kickstart files. Starting with Ubuntu server 20.04, and version 23.04 of the Ubuntu desktop, those installation methods became deprecated, and the distribution adopted a new autoinstall format, which takes advantage of cloud-init.
« Previous ( 1 ... 3 4 5 6 7 8 9 10 11 12 13 ... 35 ) Next »