Keyword: linux
-
The best future of the internet may be peer-to-peer. The Beaker Browser offers a glimpse. When Tim Berners-Lee invented the World Wide Web, he envisioned a single software package that allowed everyone to create and read pages across the internet. Much has happened in the intervening years, but this idea is starting to come back. Many of the web's founders now realize that they didn't sign up for a web dominated by a few giant corporations relying on collecting massive amounts of data on its users to sell to advertisers. The Beaker Browser project is creating a decentralized peer-to-peer web...
-
Bugs happen. Every minute of every hour of every day, software bugs are hard at work, biting computer users in the proverbial posterior. Many of them go unnoticed (the bugs, not the posteriors). More still rise to the illustrious level of "bugs that are minor annoyances". Yet sometimes, when the stars align just so, a bug manifests itself in a truly glorious way. And when I say "glorious", I mean "utterly destructive and soul-obliterating". Nowhere are these bugs more insidious than when they are within the operating systems (and key components) themselves. Case in point: an October 2018 bug in...
-
Filesystems are responsible for organizing how data is stored and recovered. One way or another, with time, filesystem may become corrupted and certain parts of it may not be accessible. If your filesystem develops such inconsistency it is recommend to verify its integrity.This can be completed via system utility called fsck (file system consistency check). This check can be done automatically during boot time or ran manually.In this article, we are going to review the fsck utility and its usage to help you repair disk errors.When to Use fsck in Linux There are different scenarios when you will want to...
-
Bash case statements are generally used to simplify complex conditionals when you have multiple different choices. Using the case statement instead of nested if statements will help you make your bash scripts more readable and easier to maintain.The Bash case statement has a similar concept with the Javascript or C switch statement. The main difference is that unlike the C switch statement the Bash case statement doesn’t continue to search for a pattern match once it has found one and executed statements associated with that pattern.In this tutorial, we will cover the basics of the Bash case statements and show...
-
At this stage of our Bash basics series, it would be hard not to see some crossover between topics. For example, you have already seen a lot of brackets in the examples we have shown over the past several weeks, but the focus has been elsewhere.For the next phase of the series, we’ll take a closer look at brackets, curly, curvy, or straight, how to use them, and what they do depending on where you use them. We will also tackle other ways of enclosing things, like when to use quotes, double-quotes, and backquotes.This week, we're looking at curly brackets...
-
About umask Return, or set, the value of the system's file mode creation mask.Description On Linux and other Unix-like operating systems, new files are created with a default set of permissions. Specifically, a new file's permissions may be restricted in a specific way by applying a permissions "mask" called the umask. The umask command is used to set this mask, or to show you its current value.umask Syntaxumask [-S] [mask]Options -S Accept a symbolic representation of a mask, or return one. mask If a valid mask is specified, the umask is set to this value. If no mask is specified,...
-
Academics from Greece have devised a new browser-based attack that can allow hackers to run malicious code inside users' browsers even after users have closed or navigated away from the web page on which they got infected This new attack, called MarioNet, opens the door for assembling giant botnets from users' browsers. These botnets can be used for in-browser crypto-mining (cryptojacking), DDoS attacks, malicious files hosting/sharing, distributed password cracking, creating proxy networks, advertising click-fraud, and traffic stats boosting, researchers said. . .
-
tmux is a terminal multiplexer similar to GNU screen, which is used to create, access, and control multiple terminal sessions from a single console. It is useful for system administrators for running more than one command-line program at the same time. One useful feature of tmux is that it can be detached from a screen and continue running in the background, then later reattached. In this regard, it allows SSH sessions to remain active even after disconnecting from the console. In tmux, a session is a container for individual consoles being managed by tmux. Each session has one or more...
-
For the BOFHs**: Admin Center preview loaded with Software Defined Networking goodness In a busy week for Windows Insiders, Fast-Ring fans got a fresh build of Windows last night, hot on the heels of a new preview of the Windows Admin Center.You say 19H1, I say 20H1, let's call the whole thing off Having sent Skip-Ahead testers into the future with a 20H1 build of Windows 10, Microsoft has now shared the Linux love with those remaining on the Fast Ring and testing 19H1.The accessing of files lurking in distros running Windows Subsystem for Linux (WSL) without fear of corruption...
-
The man command is used to format and display the man pages. The man pages are a user manual that is by default built into most Linux distributions (i.e., versions) and most other Unix-like operating systems during installation. They provide extensive documentation about commands and other aspects of the system, including configuration files, system calls, library routines and the kernel (i.e., the core of the operating system). A configuration file is a type of simple database that contains data that tells a program or operating system how to behave. A system call is a request made via a software...
-
Having a single CD or USB drive with multiple available operating systems, for install, can be extremely useful in all kind of scenarios. Either for quickly testing or debugging something or simply reinstalling the operating system of your laptop or PC, this can save you lots of time. In this article, you will learn how to create multi bootable USB media, by using tool called MultiCD – is a shell script, designed to create a multiboot image with different Linux distributions (means it combine several boot CDs into one). That image can later be written to CD/DVD or flash drive...
-
In this article we will demonstrate 16 useful cp command examples specially for the linux beginners. Following is the basic syntax of cp command, Copy a file to another file# cp {options} source_file target_fileCopy File(s) to another directory or folder# cp {options} source_file target_directory Copy directory to directory# cp {options} source_directory target_directoryLet’s jump into the practical examples of cp command,Example:1) Copy file to target directory Let’s assume we want copy the /etc/passwd file to /mnt/backup directory for some backup purpose, so run below cp command,root@linuxtechi:~# cp /etc/passwd /mnt/backup/ root@linuxtechi:~#Use below command to verify whether it has been copied or not.root@linuxtechi:~# ls...
-
Combined companies will offer endpoint security with built-in cloud backup. The data backup and storage company Carbonite has announced that it has acquired endpoint security provider Webroot for $618m. The deal will allow Carbonite to combine the strengths of both companies to provide customers with automated cloud security software that has emergency backup already built in.
-
This tutorial shows you how to list users in Linux. You’ll also learn to list only the logged users. Today different Operating Systems have the capability to use multiple users, each one with their settings and custom configurations to make things easier for administrators and operators to work in together on the same system.Linux on the other hand is very strong on this matter as it allows multiple users to work at the same time on the system in an independent way. It can even allow a single user to open several sessions even from different locations in order to...
-
As its name suggests, rsync is a synchronization tool. The first time you use it, it simply copies files and directories from one location to another. Subsequent uses, however, synchronize only the differences between these locations. So, if you add one file to the source directory, rsync will copy only the new file to the destination. This saves a lot of time and bandwidth, especially when copying to a remote location.Imagine you have 50GB of data you have to synchronize to a remote server. You can schedule rsync to run daily. Instead of having to copy the whole 50GB...
-
Expansion Each time you type a command line and press the enter key, bash performs several processes upon the text before it carries out your command. We have seen a couple of cases of how a simple character sequence, for example “*”, can have a lot of meaning to the shell. The process that makes this happen is called expansion. With expansion, you type something and it is expanded into something else before the shell acts upon it. To demonstrate what we mean by this, let's take a look at the echo command. echo is a shell builtin that performs...
-
A Guided Tour It's time to take our tour. The table below lists some interesting places to explore. This is by no means a complete list, but it should prove to be an interesting adventure. For each of the directories listed below, do the following: cd into each directory. Use ls to list the contents of the directory. If you see an interesting file, use the file command to determine its contents. For text files, use less to view them. Interesting directories and their contents Directory Description / The root directory where the file system begins. In most cases the...
-
When Linux was originally made public, it lacked many useful applications that the major competitor -Microsoft Windows was successfully supporting. Linux thus created a compatibility layer which was used to run the Windows application on Linux itself called Wine. PlayOnLinux is a front-end UI for the Wine application. It lets you install many popular Windows applications that you otherwise missed to use on Linux. You can run Microsoft Office, Microsoft Internet Explorer, Safari, iTunes and many other applications on your Linux system through PlayOnLinux.In this article, we will explain how to install PlayOnLinux on your Ubuntu both through the command...
-
Why Bother? Why do you need to learn the command line anyway? Well, let me tell you a story. A few years ago we had a problem where I used to work. There was a shared drive on one of our file servers that kept getting full. I won't mention that this legacy operating system did not support user quotas; that's another story. But the server kept getting full and it stopped people from working. One of our software engineers spent the better part of a day writing a C++ program that would look through all the user's directories and...
-
Changing operating systems is a big step for anybody -- all the more so because many users are uncertain about exactly what an operating system is.However, switching from Windows to Linux is especially hard. The two operating systems have different assumptions and priorities, as well as different ways of doing things. As a result, it is easy for new Linux users to wind up confused because the expectations they have developed using Windows no longer apply.For instance, here, in no particular order, are seven mistakes that refugees from Windows can fall into when they start to use Linux:7. Choosing the...
|
|
|