How To Delete a File in Linux
All UNIX-based operating systems, including Linux, follow the structure that “everything is a file.” These systems treat all the regular files, directories, processes, symbolic links, and devices like...
View ArticleHow To Use htop Command in Linux
The htop is a CLI utility to check an interactive list of running processes in real-time. It is a more feature-rich and user-friendly alternative to the top command. The htop command allows you to...
View ArticleHow To Use Traceroute Command in Linux
Operating systems use packets for transferring the data on a network. These are small chunks of information that carry data and travel among devices. Moreover, when any network problem arises, packets...
View ArticleHow to Change File Permissions in Linux
Linux works well as a multiuser operating system. Many users can access a single OS simultaneously without interpreting each other. However, if others can access your directories or files, the risk...
View ArticleHow To Use Grep Command in Linux
As the name suggests, grep or global regular expression print lets you search for specific text patterns within a file’s contents. Its functionalities include pattern recognition, defining case...
View ArticleHow to Create File in Bash
Creating a file in Bash scripting is an essential skill for a good Linux administrator. In Linux, a few commands allow you to easily generate logs, configuration, or even basic text files. Hence, you...
View ArticleHow to Make Bash Script Executable
Bash scripts are an essential part of the Linux system, but they are not like other files because scripts need executable permissions. These permissions help a script execute commands and make changes...
View ArticleWhat is Proper File Extension for a Bash Script
Bash or Bourne Again Shell is one of Linux’s most essential features. It is an interpreter of shell commands that you can use to automate tasks and perform various actions. In other words, you can add...
View ArticleBash Script Include Another Bash Script
If you are a Linux enthusiast, then you have probably heard of the bash scripting concept. In bash scripting, you can automate the code block of the command sequence. However, sometimes, the code...
View ArticleHow To Enable SSH on Ubuntu 24.04
If you have two PCs at two locations and want to access another to get some files, You can use Secure Shell, also known as SSH. SSH is a cryptographic network protocol that lets you connect to a...
View ArticleDd Command Examples on Linux
The dd command, or data duplicator, is a robust and versatile utility famous for its disk manipulation features. While its primary purpose is to create disk images, it also lets you clone data,...
View ArticleHow To Restart SSH Service in Linux
The Secure Socket Shell, or SSH, is a widely used utility for controlling servers remotely. It can also be used to operate, monitor, and manage remote machines. SSH uses the cryptographic protocol to...
View ArticleHow to Log Out of SSH
Secure Shell utility connects to remote devices and servers, allowing you to operate and monitor them efficiently. It establishes the connection through a cryptographic protocol, ensuring a safe and...
View ArticleHow to Use SSH to Access a Remote Server in Linux
Secure Socket Shell (SSH) is a robust tool for accessing remote machines and servers. It establishes the connection via a cryptographic protocol, ensuring utmost privacy and security. You can use SSH...
View ArticleHow to Setup and Use Sshfs in Linux
The SSH File System, or SSHFS, is a filesystem client that you can mount on your local device to interact with files on the remote device. SSH establishes this connection using the Secure Shell File...
View ArticleHow To Add SSH Key to GitHub
GitHub is a famous platform for developers to create, store, share, and manage program codes. Here, you can control an application’s versions, host repositories, collaborate and socialize with other...
View ArticleHow to Disable IPv6 on Ubuntu 24.04
IPv6 is the latest version of IP (Internet Protocol) to provide IP addressing and enhance the security of connected devices. However, specific applications or networks don’t support IPv6, making it...
View ArticleHow to Tunnel Web Traffic Through SSH for Secure Browsing
Nowadays, an uncountable number of cyber attacks, scams, and data theft occur every single day. This makes it necessary for users to look for ways to secure their data. After all, it is better to take...
View ArticleHow to SSH Into Docker Container
Administrators commonly use SSH to access and operate remote servers and devices, including a Docker container. When you connect to any device using SSH, you can run commands, access its files, and...
View ArticleWhat is Shebang: Bash Script Header on First Line?
As Linux enthusiasts, we all come across bash scripting as an essential part of the Linux system. However, many Linux users don’t know why the first line of the bash script contains #!. So this...
View Article