Recent Articles

Difference Between Soft Link And Hard Link In Linux With Examples

Hard Link acts like a mirror copy of the original file. These links share the same inodes. Changes made to the original or hard linked file will reflect in the other. When you delete Hard Link nothing will happen to the other file. Hard links can't cross file systems. Soft Link is an actual link to […]

May 13, 2011 | By
| 4 Replies More

Commands Check Linux OS is 64 / 32 bit and CPU 64 / 32 Bit

You will need to use the 'uname' command to check the system information including kernel version and whether kernel is 32 bit or 64 bit. In order to check if the CPU is 32 or 64 bit, you need to run the less /proc/cpuinfo command. More commands and details are given below: How to tell if linux (kernel) […]

May 13, 2011 | By
| Reply More

9 Examples To Generate Random Password In Linux

You may have noted that often when you create an account on some website, you are provided with a random password. How can we generate this random data (or passwords in our case) on Linux? This can be done in a number of ways. Let's see how. Generating Random Passwords Linux has a powerful way of […]

May 13, 2011 | By
| Reply More

Parted Command To Create Partition Larger Than 2TB In Linux

Parted is a GNU utility and is used to create, manipulate and delete the hard disk partitions. You can even clone partitions. There are other utilities available in Linux, such as fdisk, for performing disk related operations. But frankly speaking, it is not possible to create a Linux partition larger than 2 TB using the fdisk command. […]

May 10, 2011 | By
| 3 Replies More

Linux Iptables To Block Different Attacks

Iptables is a Linux kernel based packet filter firewall. The iptables modules are present in the kernel itself, there is no separate daemon for it. This makes the firewall very fast and effective. The Iptables rules control the incoming and outgoing traffic on a network device. In this article, we will discuss about some of the common […]

May 10, 2011 | By
| 1 Reply More

9 Linux iostat Command Examples for Performance Monitoring

The iostat command in Linux is used to monitor the system's  I/O device loading, by observing the time devices are active in relation to their average transfer rates. The iostat command generates reports that can be used to modify your system's configuration to better balance the I/O load between physical disks, or to let you know […]

May 10, 2011 | By
| Reply More

How To Read Linux Filesystem (ext2 and ext3) From Windows

The Explore2fs is an exploration tool used for reading ext2 and ext3 partitions. If you have a dual-boot system with both Linux and Windows partitions, you can access files from your Windows installation while you are using Linux. The tool is licensed under the GPLv2. Explore2fs supports multiple filesystems and multiple disk access methods. Supported Filesystems […]

May 10, 2011 | By
| Reply More

How To Record / Log Failed Login Attempt In Linux

A system administrator needs to monitor any unusual activities on the system. An unauthorized user may try to access the system by trying out different passwords. A feature in Linux that can be used to monitor these failed login attempts is “faillog” utility. The “faillog” command displays all failed login attempts by a user. If there […]

May 10, 2011 | By
| 4 Replies More

Linux Print Command : Usage Of Linux lp Command With Examples

The 'Lp' command is used to print files on Unix and Linux systems. The name 'lp' stands for 'line printer'. Normal users are allowed to have direct access to the printer. Users have to spool a job in a print queue. Spooling ensures the orderly printing of jobs. lp command is very useful in printing files […]

May 10, 2011 | By
| Reply More

What's Inside Linux Proc Filesystem

The linux /proc filesystem was developed to provide information about the processes in a system. But many elements of the filesystem are used by the kernel to get information and also to enable dynamic runtime configuration. The /proc filesystem contains directories to organize the information and virtual files. A virtual file acts like a mediator […]

May 10, 2011 | By
| Reply More

Set Ethernet Speed And Duplex Mode In Linux Using Ethtool / Mii Tool

What is Duplex setting? By default, NICs used in Linux negotiate their speed and duplex with the switch through the exchange of Fast Link Pulses (FLP). When speed and duplex are set forcibly, these FLPs are not sent. This results in errors when NIC is in an auto negotiation mode and detects no FLP. It […]

May 9, 2011 | By
| Reply More

How To Find Apache Uptime Using Script

The uptime command in Linux/Unix is used to find out how long the system has been running. Both distributions come with built- in commands to check put server uptime. In Linux, the file '/proc/uptime' contains uptime information, and the file '/var/run/utmp' has all the details about who has logged in the system. However, information in these […]

May 9, 2011 | By
| Reply More

Power of Linux lsof Command for Daily Usage in Linux

"lsof" stands for List Open Files. It is extremely useful for a system administrator to find out the details about files that have been opened and their respective processes. In Linux, everything is just a file -  pipes, directories, inodes, or IP sockets. With the help of this command, you can monitor your system for what is actually going on, […]

May 9, 2011 | By
| Reply More

How to Encrypt/Decrypt and Signing using GPG Command in Linux

There is no absolute security on the internet or through a network. Because our equipment are regularly connected on the internet and there is some communication, we need to protect the criticals information we exchange. Encryption will be a welcome safeguard for whenever you, your family, or business partners need to communicate sensitive information from […]

May 9, 2011 | By
| Reply More