Recent Articles

Rpmforge Repo : How To Install And Set Yum Priority

How to Install Rpmforge? Linux distributions namely CentOS and RHEL 5 use yum repositories for the management of software. Yum adds a new repository which is then used as a source to install binary software. Yum repository is configured using /etc/yum.conf file. Configuration also requires additional files which are read from the directories set by […]

May 16, 2011 | By
| Reply More

How To Delete / Clear Linux Comand Line History With Examples

You may want to clear the history file and the screen for security reasons. Some Linux distributions may clear the screen when you logout but others do not. Many programs read input as a single line at a time. The GNU history library is able to keep track of those lines, associate arbitrary data with […]

May 15, 2011 | By
| Reply More

Linux YUM Repositories Configuration / Add More Repositories

This article will show you how to set up repositories in YUM (Yellodog Updater Modified), the default package manager for Red Hat based Linux distributions. We will also discuss what the repositories are and why we need to set them up. Dependencies among packages Software packages in Linux often depend upon other packages to run […]

May 15, 2011 | By
| Reply More

Examples : Binding Multiple IP to One Interface In Linux

Linux can be deployed as a very powerful web server. Sometimes, you may require to host multiple web sites on it. Hosting multiple sites on a single server is achieved through virtual hosting. For virtual hosting, multiple instances of the web server are run. The web service needs a specific port (80) to run and if there […]

May 14, 2011 | By
| Reply More

Examples To List / Install / Remove / Configure Linux Kernel Module

Linux is a monolithic kernel. A monolithic kernel is a kernel architecture in which all the services of process management, filesystem management, I/O and device management run in the kernel space, i.e. the kernel is responsible for handling these services. So these are loaded into memory with the kernel, at the time of booting up. With […]

May 14, 2011 | By
| Reply More

Enhanced Free Ping Utility In Linux - Sing Tool

Ping is a great utility to check the network connections and troubleshoot the network related problems. It uses ICMP (Internet Connection Message Protocol) packets to check if a system is up and running. But you cannot do much with ping command. SING (Send ICMP Nasty Garbage) tool is like PING, with certain enhancements over ping. […]

May 14, 2011 | By
| Reply More

What is Symbolic Link or Soft Link means in Linux

Symbolic Link or Soft Link is a special type of file that contains reference which points to another file or directory. Soft Links are often used as a file or folder because they hardly contain any text strings to be interpreted and followed by the operating system. Soft Links are supported on almost all Redhat distributions. Although […]

May 13, 2011 | By
| 2 Replies More

How To Remove Symbolic Link In Linux With Example

Symbolic links or Soft links work like pointers to another file. Note that there is only one copy of the actual file on the hard disk and in this way you can save valuable hard disk space by simply creating a link to it. Deleting a symbolic link is the same as removing a real […]

May 13, 2011 | By
| Reply More

Difference Between Soft Link And Hard Link In Linux With Examples

Hard Link acts like a mirror copy of the original file. These links share the same inodes. Changes made to the original or hard linked file will reflect in the other. When you delete Hard Link nothing will happen to the other file. Hard links can't cross file systems. Soft Link is actual link to the […]

May 13, 2011 | By
| 4 Replies More

Commands Check Linux OS is 64 / 32 bit and CPU 64 / 32 Bit

You will need to use the 'uname' command to check the system information including kernel version and whether kernel is 32 bit or 64 bit. In order to check if the CPU is 32 or 64 bit, you need to run the less /proc/cpuinfo command. More commands and details are given below: How to tell if linux (kernel) […]

May 13, 2011 | By
| Reply More

9 Examples To Generate Random Password In Linux

You may have noted that often when you create an account on some website, you are provided with a random password. How can we generate this random data (or passwords in our case) on Linux? This can be done in a number of ways. Let's see how. Generating Random Passwords Linux has a powerful way of […]

May 13, 2011 | By
| Reply More

Parted Command To Create Partition Larger Than 2TB In Linux

Parted is a GNU utility and is used to create, manipulate and delete the hard disk partitions. You can even clone partitions. There are other utilities available in Linux, such as fdisk, for performing disk related operations. But frankly speaking, it is not possible to create a Linux partition larger than 2 TB using the fdisk command. […]

May 10, 2011 | By
| 3 Replies More

Linux Iptables To Block Different Attacks

Iptables is a Linux kernel based packet filter firewall. The iptables modules are present in the kernel itself, there is no separate daemon for it. This makes the firewall very fast and effective. The Iptables rules control the incoming and outgoing traffic on a network device. In this article, we will discuss about some of the common […]

May 10, 2011 | By
| 1 Reply More

Iostat Linux Command - Performance Monitoring In Linux With Examples

The iostat command in Linux is used to monitor the system's  I/O device loading, by observing the time devices are active in relation to their average transfer rates. The iostat command generates reports that can be used to modify your system's configuration to better balance the I/O load between physical disks, or to let you know […]

May 10, 2011 | By
| Reply More