Recent Articles

6 Examples Linux Chage Command : Set Password Aging For User

The command name ‘chage’ is an acronym for ‘change age’. This command is used to change the user's password's aging / expiry information. Any user can execute this command with the ‘-l’ option to view their password and aging information. No other unauthorised users can view the password's aging/expiry information. As the root user, you can […]

May 2, 2011 | By
| Reply More

How Linux Who & Last Command Helps for Root Cause Analysis

The last command is very important in linux as it helps in doing root cause analysis of the linux system. Assume that something is changed in the linux system, in this situation you are not sure who has made the changes. Using the 'last' command you can identify who logged in at the particular time when the changes were made. […]

May 2, 2011 | By
| 1 Reply More

Example : How To Encrypt / Decrypt A File In Linux

If you are really concerned about the privacy and confidentiality of your files, encrypting files can help you. File encryption in Linux can be done in many ways, such as, using keys and software. GPG( Gnu Privacy Guard) by GNU is an encryption software provided free of charge. Here,we are trying to encrypt a file named “test”. GPG […]

April 30, 2011 | By
| Reply More

How to Display Physical / Volume Group / Logical Volume in LVM

Logical Volume Manager (LVM) for Linux provides a flexible and efficient way of disk management. Virtual partitions are created by using LVM. These virtual partitions can easily be resized in comparison to normal disk partitions. This article provides an overview of LVM and how these Logical Volumes can be activated. The physical partitions on the disk form Physical […]

April 30, 2011 | By
| Reply More

Few Tips Check Hard Disk Error and Health using smartctl

Checking the hard drive status of your pc is important. All the sensitive data is in your hard disk. In case of a hard disk failure, recovery is difficult and time consuming. Hard disks can have errors due to power failures and usage. Common errors include bad sectors or physical errors. Checking the hard disk status is […]

April 30, 2011 | By
| Reply More

How to Use ldapsearch command and Test ldap connection

The ldapsearch command opens a connection to an LDAP server, binds, and performs a search using specified parameters. The ldapsearch tool has four types of options: Common Options Input And Output Options LDAP Controls Options SSL (Secure Socket Layer) Options Common Options The ldapsearch -H command and option, when run on the command line, will display […]

April 30, 2011 | By
| Reply More

4 Examples To Grant Normal User Root Privileges In Linux

The “root” super user is the king of users in Linux/Unix. Having root access grants full and unlimited access to the Linux box. I will show you how to allow root access to a user in a Linux system. Typically, root level access is used in system administration. So it is always a pain to give root access […]

April 30, 2011 | By
| 2 Replies More

Linux Grub Bootloader Files And Set Grub Password With Examples

Boot loader is an integral part of the computer. In computing, booting is a set of operations that computer systems perform when power is on. Today, modern computers take one- tenth of a second and typically perform power on self test (POST). A Boot Loader is a computer program that loads the main operating system of the computer after […]

April 30, 2011 | By
| Reply More

Create LVM On New Disk In Redhat Linux

First of all, make a partition using fdisk command and then toggle that partition to LINUX LVM (8e) label.Then create a physical volume using pvcreate command as follows: #pvcreate /dev/hda10 To display the size of the physical volume: #pvdisplay /dev/hda10 To create volume group whose name test: #vgcreate test /dev/dha10 To display the details of volume […]

April 30, 2011 | By
| Reply More

How To Boot Linux Grub Into Single User Mode

GRUB is a GRand Unified Bootloader, the default bootloader in Linux. GRUB can be used to boot Linux in the single user mode. The single user mode is a restricted mode, that is used for maintenance purposes. In single user mode, the only user available is the root user, and in RHEL, no password is asked for […]

April 30, 2011 | By
| Reply More

10 Example Scenarios To Learn Linux Find Command

The linux command “find” is a very powerful command which is basically used for searching files under a directory structure. This command can be used to find files using a variety of options such as by name,file type, inode number, file permissions etc. The output of "find" command can be used to perform other operations […]

April 30, 2011 | By
| 1 Reply More

Linux Awk Command With Examples To Make It Easy

AWK is a programming language or a tool which can be used to perform a wide variety of tasks, from simple tasks such as printing a message or displaying a file, to complex programs of solving SU-DO-KU. Awk is not just any tool but a programming language, by Aho, Weinberger, and Kernighan. It is a field […]

April 30, 2011 | By
| Reply More

About Semaphores In Linux ? Use ipcs Command With Examples

  A semaphore is a mechanism that allows contending process or thread to alter, monitor queries, and control shared system resources. A semaphore is a solution to race condition in multiprocessing system. Race condition occurs when multiple processes try to access shared resources. If the multi-threaded feature is needed by the application, then it comes with a set of […]

April 30, 2011 | By
| Reply More

How To Check LUN or SAN Disk In Linux

To check the attached LUN from a storage device in Linux, we have explained this with few commands. It is just to understand better how to manage attached storage. #cat /proc/scsi/scsi file, it will give you information as shown below: Attached devices: Host: scsi0 Channel: 00 Id: 00 Lun: 00 Vendor: HP 36.4G Model: MAN3367MC Rev: HP05 Type: […]

April 30, 2011 | By
| Reply More