Showing headlines posted by savona
« Previous ( 1 2 3 4 5 ... 6 ) Next »How to Create a Custom Login Banner or MOTD in Linux
A fun little article about how to display a custom login banner or motd in the Linux terminal.
Linux Tail Command - Everything You Need to Know (Videos)
In-depth look at the Linux tail command including it's basic usage and it's more advanced usage like tailing rotating log files and exit on pid termination.
The at Utility Suite, Deeper than your Thought
In this deep dive we take a look at the "at" utility suite. We discuss how to use at to schedule one-time jobs, how to manage, list and delete scheduled jobs. Learn to use different queues, and schedule jobs to run only when system load averages permit using the batch feature. Of course, we also touch on how to secure use of the at command.
Using Lock Files in Bash Scripts for Job Control
Using lock files as job control for Linux bash scripts. Learn how to create a basic lock file, locking files with flock and see examples of each.
How to Find and Delete Empty Files and Directories on Linux Command Line
Learn how to find and delete empty directories and files on the Linux command line using the find command and some of it's options.
Safely Creating Temporary Files and Directories for Shell Scripting
How to safely create temporary files and directories to be used in Linux shell scripting. Learn some of the security concerns related to temporary files and how to implement best practices.
4 Ways to Get your Systems IP Address from the Linux Command Line
Learn how to get your systems IP address information from the Linux command line using various tools including nmcli, hostname and ip commands.
3 Ways to Create an Encrypted Archive
Discussion on different methods to create an encrypted archive and the pros and cons of each.
How to Mitigate ICMP Timestamp Vulnerabilities in Linux
Learn how to mitigate the ICMP timestamp vulnerability in Linux by blocking certain types of Internet Control Message Protocol at the firewall.
Hard Links vs Soft (Symbolic) Links in Linux and How to Create Them
Learn the difference between hard link and soft links in Linux and how to create them with examples.
How to Generate a Random Number in Linux
How to generate a random number from the Linux command line. We will explore how to generate a random number within a range and also a specific length.
5 Command Line Tools to Break Your Dependence on the GUI
Learn about 5 interesting Linux tools that will help break your dependence on the GUI and keep you productive on the command line.
The Linux rev Command with 3 Practical Examples
How to use the Linux rev Command to reverse characters in text files and strings. We also explore 3 practical uses for the rev command.
Using systemd Timer Units to Schedule Jobs and Their Benefits over Cron
Learn how to create systemd timer units to schedule jobs. We also discuss the benefits of using timer units over cron jobs.
Get the Execution Time of a Shell Script
In this short tutorial we take a look at the SECONDS built in shell variable. We discuss what it is, how to use it and formatting it to cleanly display the time a shell script took to execute.
Yes,it isn't completely useless. All about the Linux yes Command.
A fun a lighthearted look at the Linux yes command. A little something different to break the monotony, of all the hardcore Linux that has gotten to be, a little bit out of control it's cool to enhance. But what about a piece that soothes and moves jubilance.
Print the Time a Command took to Execute in Linux
Learn how to print the time a command took to execute. Take a dive deep into the differences between the time shell keyword and the time binary executable. We also use experimentation to demonstrate the pros and cons of each.
An interesting look at the Linux tr Command
Today we are taking an exhaustive look at the tr command. We learn how to substitute, delete and squeeze characters on the command line. We also take an in-depth and interesting look at two cryptic options, the complement option as well as truncate, which does not do what you think.
Creating a Password Policy in Linux
Learn how to use pwquality pam module to create a password policy in Linux. We also discuss the use of character credits and how they effect your policy.
How to Delete a User and Avoiding Residual Security Implications of Doing So
Deleting a user is simple right... Not so fast. There can be some residual security risks. In this short article we discuss how to delete a user, possible security implications and how to avoid them.