Showing headlines posted by linuxer
« Previous ( 1 2 3 4 5 6 7 8 9 ... 33 ) Next »Encrypting and Decrypting Files and Directories on Linux Using mcrypt command
Encryption is a crucial aspect of securing sensitive information on your Linux system. One of the tools you can use for this purpose is mcrypt, which provides symmetric encryption and decryption capabilities. This guide will walk you through the process of using mcrypt to encrypt and decrypt files and directories on Linux, covering a range of options and examples.
How to Substitute Only the First Match Occurrence Using the Sed Command
The sed command, short for stream editor, is a powerful tool in Unix and Linux systems used for parsing and transforming text. One of the common tasks performed with sed is substitution, where you replace occurrences of a specific pattern within a file or a stream.
Copying Files and Directories While Preserving SELinux Context on Linux
Security-Enhanced Linux (SELinux) is a powerful security module that provides mechanisms for supporting access control security policies. When managing files and directories on a SELinux-enabled system, it’s crucial to preserve their SELinux context to maintain their security properties. This article will guide you through the steps to copy files and directories while preserving their SELinux context on a Linux system.
Setting Up a WebDAV Server on Ubuntu and Debian
Web Distributed Authoring and Versioning (WebDAV) allows users to collaboratively edit and manage files on remote web servers. This guide will walk you through the installation and configuration of a WebDAV server on Ubuntu and Debian using Apache2.
The Rise of Ethical Hackers: Securing Systems in a Digital World
In our modern, digital age, the security of computer systems is paramount. Ethical hackers are skilled professionals who test these systems, networks, and applications, searching playfully for weaknesses and vulnerabilities that criminal hackers might exploit. This field of cybersecurity has been growing rapidly, with the number of job openings for ethical hackers consistently surpassing the supply of qualified professionals.
How to Exclude Directories from the Find Command Search in Linux
In this article, we will delve into the methods for explicitly excluding directories from the find command‘s search in Linux. The find command is a powerful utility for searching for files and directories within a directory hierarchy. However, there are scenarios where you may want to exclude certain directories from your search to speed up the process or to avoid irrelevant results. We’ll explore different options and provide practical examples using a sandbox directory structure.
Mastering dd Command: Comprehensive Guide with Practical Examples
What you’re reading is only the first of many articles from the “Learning Linux Commands” series. Why would we want to do such a thing? Because it’s useful to have every option and possible use of a widely used command all in one place.
How to Convert Documents Between LibreOffice and Microsoft Office File Formats on Linux
Converting documents between LibreOffice and Microsoft Office file formats can be essential for ensuring compatibility and ease of access across different platforms and software suites. On Linux, several methods and tools are available to facilitate this conversion process, enabling users to switch seamlessly between file formats without losing data integrity or formatting.
How to List, Import, and Remove Archive Signing Keys on CentOS
In this tutorial, we will explore how to manage archive signing keys on CentOS. Archive signing keys are crucial for ensuring the integrity and authenticity of software packages installed on your system.
How to install the Zed code editor on Linux
Zed is a high-performance, “multiplayer”, free and open source code editor written in Rust and developed in the open on GitHub. It was created by the same authors as the Atom text editor, and although it has IDE features, it is very responsive. In this tutorial, we learn how to install Zed on some of the most used Linux distributions.
How to enable/disable firewall on Ubuntu Linux
The default firewall on Ubuntu is ufw, which is short for “uncomplicated firewall.” Ufw is a frontend for the typical Linux iptables commands, but it is developed in such a way that basic firewall tasks can be performed without the knowledge of iptables.
How to Install Adobe Acrobat Reader on Ubuntu and Debian Linux
While Ubuntu and Debian come with native applications to open PDF documents by default, some users may prefer to install Adobe Acrobat Reader for its additional features and compatibility. This tutorial will guide you through the process of installing Adobe Acrobat Reader on Ubuntu and Debian. This application will provide enhanced capabilities for opening and managing PDF documents on these Linux distributions.
How to monitor a CPU temperature on RHEL/CentOS Linux
Monitoring the CPU temperature on RHEL/CentOS systems is crucial for ensuring the optimal performance and longevity of your hardware. Overheating can lead to thermal throttling, reduced lifespan of components, or even system crashes. In this guide, we will explore several methods to monitor CPU temperature, providing you with the tools to keep your system cool and running smoothly.
How to Install Chrome Browser on CentOS Linux
Installing Google Chrome on CentOS can be a straightforward process if you follow the right steps. Chrome, a popular web browser developed by Google, offers a fast and secure browsing experience. This guide will walk you through the process of installing Google Chrome on your CentOS system, including CentOS 7, 8, 9, and higher, as well as CentOS Stream versions.
Linux: What Process is Listening on a Port
Understanding which processes are listening on specific ports in Linux is crucial for system administration and security. This knowledge helps diagnose network issues, secure the system, and ensure services are running as expected. In this article, we’ll guide you through identifying listening ports and the processes using them on your Linux system.
Bash Scripting vs Shell Scripting: Differences, Examples, and Comparisons
Bash scripting and shell scripting are essential skills for anyone working in a Unix-like environment. Although these terms are often used interchangeably, they refer to different scopes and functionalities. Understanding the nuances between bash scripting and shell scripting can significantly enhance your ability to automate tasks, manage systems, and write efficient code.
Restarting Docker on Linux: daemon, containers, composer and services
Docker is a powerful platform for developing, shipping, and running applications inside containers. However, there are times when you might need to restart Docker or its components for various reasons, such as applying updates, resolving issues, or simply refreshing the environment. This guide will walk you through multiple ways to restart Docker on a Linux system, ensuring your containers and services continue to run smoothly.
How to Reset a Network Interface in Linux
In this tutorial, we will explore how to reset a network interface in Linux. Resetting a network interface can help resolve network issues, apply new settings, or refresh the network connection. This process involves bringing the interface down and back up, reloading drivers, and flushing configurations if necessary.
How to keep two directories in sync using lsyncd on Linux
Lsyncd (Live Syncing Daemon) is a free and open source we can use to keep a source and a target directory tree in sync. Written in the LUA programming language, it works by keeping track of filesystem events on the source, and replicating them on the target, typically using tools like rsync and ssh, under the hood. In this tutorial, we learn how to install lsyncd on the most used Linux distributions, and how to configure it to keep local and remote directories in sync.
How to Remove All Files and Directories Owned by a Specific User or Group on Linux
Removing all files and directories owned by a specific user or group on a Linux system can be crucial for maintaining system integrity and ensuring proper management of user data. Whether you need to clean up resources after removing a user, enforce security policies, or simply free up disk space, understanding the steps to perform this task efficiently and safely is important.