Author Archive: Shaha Alam
I have Over 4+ years Experience in Telecom domain as Software Engineer with application Support Engineer & AIX / Solaris / Unix / Linux System Admin , Shell Scripting, SQL,Oracle Database , ETL Tools Affirm (Connectiva ) , Mediation IME . Experience on Linux/Unix, Shell Scripting, TCP/IP, Networking Protocol, HTTPS, SMPP, Monitoring Basics. Experience in Vmware , DNS, MAIL, LDAP, NIS , Raid ,Zone , Tomcat , Apache ,AWS.
The kill command is used on linux and other Unix-like operating systems ( Solaris, AIX, HP-Unix, Mac). It doesn’t matter which operating system you are using to terminate processes without having to log out or reboot the computer. A process, also referred to as a task, is an executing (i.e., running) instance of a program. […]
In this article let us review how to perform normal file operation on a compressed files using the powerful Linux Z commands.Some of these z commands uncompressed the file temporarily in the /tmp directory to perform the specified operation. Some of the z commands uncompressed it to perform the specified operation. But, under any case, […]
PDSH is a very smart little tool that enables you to issue the same command on multiple hosts at once, and see the output. It is a high-performance and parallel remote shell utility. It can run multiple remote commands in parallel and uses a "sliding window" (or fanout) of threads to conserve resources on the initiating host […]
Rainbow stream is a free open source, smart and nice terminal based twitter client. It provides real time tweet stream, compose, search, favourite and much more fun directly from linux terminal. It is written in Python and built on top of twitter API and python twitter tool. To run this application in your console you […]
SSH is a popular, powerful, software-based approach to network security. It is used for logging into a remote machine and for executing commands on a remote machine. Whenever data is sent by a computer to the network, ssh will automatically encrypts it. It is designed and created to provide the best security when accessing another computer remotely. […]