Recent Articles

What's Inside Linux Proc Filesystem

The linux /proc filesystem was developed to provide information about the processes in a system. But many elements of the filesystem are used by the kernel to get information and also to enable dynamic runtime configuration. The /proc filesystem contains directories to organize the information and virtual files. A virtual file acts like a mediator […]

May 10, 2011 | By
| Reply More

Set Ethernet Speed And Duplex Mode In Linux Using Ethtool / Mii Tool

What is Duplex setting? By default, NICs used in Linux negotiate their speed and duplex with the switch through the exchange of Fast Link Pulses (FLP). When speed and duplex are set forcibly, these FLPs are not sent. This results in errors when NIC is in an auto negotiation mode and detects no FLP. It […]

May 9, 2011 | By
| Reply More

How To Find Apache Uptime Using Script

The uptime command in Linux/Unix is used to find out how long the system has been running. Both distributions come with built- in commands to check put server uptime. In Linux, the file '/proc/uptime' contains uptime information, and the file '/var/run/utmp' has all the details about who has logged in the system. However, information in these […]

May 9, 2011 | By
| Reply More

Power of Linux lsof Command for Daily Usage in Linux

"lsof" stands for List Open Files. It is extremely useful for a system administrator to find out the details about files that have been opened and their respective processes. In Linux, everything is just a file -  pipes, directories, inodes, or IP sockets. With the help of this command, you can monitor your system for what is actually going on, […]

May 9, 2011 | By
| Reply More

Linux File Encryption and Decryption Using gpg Command

Let us first try to understand what is encryption. Encryption is a process of embedding plain text data in such a way that it cannot be decoded by outsiders. It is necessary to encrypt data to prevent misuse. GPG command is the main GnuPG program that is used to encrypt or decrypt a particular folder […]

May 9, 2011 | By
| Reply More

Linux Tcp Ports - How To Use Netstat and Iptables For Linux Troubleshooting

It is a well known fact that Linux/Unix systems are mostly used as servers and are often in connection to the internet. In such platforms, access is limited by ports used. The term 'port' means a number access point that is used to access your system much like a telephone number. Ports are usually connected […]

May 8, 2011 | By
| Reply More

How To Fix if Partition Table Entries not in Disk Order

The suggestion given below can help if your partition table is not in a proper disk order. From linux fdisk (fdsik /dev/), choose the advanced menu (by pressing x, afaik), then choose the entry for correcting partition ordering (press 'm' anytime to get some help on commands). You should know that after following the step above, your […]

May 5, 2011 | By
| Reply More

How To Reset Root Password In Linux with Screenshot

This article explains the process of resetting the root password in a CentOS Linux machine in case you have forgotten the root password. “Root” is the superuser of a Linux machine. In order to access the Linux server as a root user, you need to authenticate first. In case you have forgotten root password, you […]

May 5, 2011 | By
| Reply More

How To Increase Maximum Number Of Open Files

Command to list the number of open file descriptors Use the following command to display the maximum number of open file descriptors: #cat /proc/sys/fs/file-max The number of maximum files was reached. How do I fix this problem? Many applications such as Oracle database server needs this range to be quite higher. So, you can increase the maximum number […]

May 2, 2011 | By
| Reply More

Linux Ethtool Helps Troubleshooting Ethernet Network Cards Issues

The Ethtool command is used to change Ethernet adapter settings. With the use of this command, you can change network card speed, auto-negotiation, wake on LAN setting, duplex mode etc. It is helpful to have some information about a particular network adaptor, specially in checking the software for compatibility. It is not available by default in installation. So, […]

May 2, 2011 | By
| Reply More

Linux Boot Into Root Shell Without Prompting Password

Take the following steps: 1.Reboot server 2. Next, you will see grub-boot loader screen. Select Recovery mode and the version of the kernel that you wish to boot and type 'e' for edit. Select the line that starts with 'kernel' and type 'e' to edit the line. 3. Go to the end of the line […]

May 2, 2011 | By
| Reply More

6 Examples Linux Chage Command : Set Password Aging For User

The command name ‘chage’ is an acronym for ‘change age’. This command is used to change the user's password's aging / expiry information. Any user can execute this command with the ‘-l’ option to view their password and aging information. No other unauthorised users can view the password's aging/expiry information. As the root user, you can […]

May 2, 2011 | By
| Reply More

How Linux Who & Last Command Helps for Root Cause Analysis

The last command is very important in linux as it helps in doing root cause analysis of the linux system. Assume that something is changed in the linux system, in this situation you are not sure who has made the changes. Using the 'last' command you can identify who logged in at the particular time when the changes were made. […]

May 2, 2011 | By
| 1 Reply More

Example : How To Encrypt / Decrypt A File In Linux

If you are really concerned about the privacy and confidentiality of your files, encrypting files can help you. File encryption in Linux can be done in many ways, such as, using keys and software. GPG( Gnu Privacy Guard) by GNU is an encryption software provided free of charge. Here,we are trying to encrypt a file named “test”. GPG […]

April 30, 2011 | By
| Reply More