- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1437 Articles for Linux
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
239 Views
Introduction Checking disk space in Linux is a crucial task for maintaining the health of your system. Disk space is limited, and running out of it can lead to system failure, data loss, and reduced performance. It is essential to know how much disk space you have available and how much you are using at any given time. Luckily, checking disk space in Linux is a simple process that can be accomplished through the command line interface or the graphical user interface. Checking Disk Space Using Command Line Interface The Power of the df Command and Its Options The ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
456 Views
Introduction Debian Linux is an open-source operating system that is widely used in both personal and professional settings. It was first released in 1993 and has since then gained a reputation for being stable, secure, and reliable. Debian Linux comes with a wide range of software packages that can be easily installed and used by users. Due to its stability, Debian Linux is the preferred choice of many system administrators who need to run servers or other mission-critical applications. Checking Debian Linux Version using Command Line Interface (CLI) The Power of the CLI For those who are unfamiliar with it, ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
594 Views
Introduction Monitoring the performance of a Linux system is essential to ensuring that it is operating optimally. One of the key factors in determining the performance of a system is CPU utilization. CPU utilization refers to the percentage of time that the processor spends executing instructions from various processes and applications on the system. In Linux, there are numerous tools available for monitoring CPU utilization, but using command line tools provides a quick and efficient way to check this metric. Basic Command Line Tools for Checking CPU Utilization When it comes to monitoring CPU utilization with the command line in ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
14K+ Views
Introduction Monitoring CPU temperature on a Linux system is essential for maintaining optimal performance and preventing hardware damage. The CPU (central processing unit) is the brain of your computer, and it generates heat as it processes data. Over time, this heat can cause your CPU to slow down or even fail altogether. By monitoring your CPU temperature, you can identify potential issues before they cause permanent damage to your system. Understanding CPU Temperature on Linux CPU temperature is a measure of how hot the processor is running and is an important metric for computer performance. The faster a processor works, ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
220 Views
Introduction Released in early 2018, news of a previously unknown hardware vulnerability in Intel's CPUs shocked the IT industry. Dubbed as 'Meltdown, ' this exploit can potentially expose sensitive data on your computer such as passwords, encryption keys, and login credentials to hackers. In worst-case scenarios, it could allow attackers to take complete control of your system without leaving any trace of their activity. Understanding the Meltdown Vulnerability The Meltdown vulnerability is a security flaw that affects modern processors, including those found in most Linux-based systems. The vulnerability takes advantage of a fundamental feature of modern CPUs known as speculative ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
2K+ Views
Introduction Keeping your system up to date is essential for maintaining the security, stability, and performance of your computer. Cybercriminals are always looking for vulnerabilities in operating systems and software to exploit, putting you at risk of data breaches, identity theft, and other cyber threats. Moreover, software updates usually include bug fixes and enhancements that improve the functionality and compatibility of your applications with other programs. Therefore, it is crucial to regularly check for updates on CentOS/RHEL and apply them promptly. In this guide, you will learn how to use Yum Package Manager and DNF Package Manager - two popular ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
1K+ Views
Introduction If you are a Linux user, there is no doubt that you have heard of Ubuntu OS. Ubuntu is an open-source operating system based on the Debian architecture and is one of the most popular distributions of Linux. It's user-friendly interface, and versatile nature makes it a great operating system for both personal and professional use. As with any operating system, password security in Ubuntu is of utmost importance. With cyberattacks increasing day by day, secure passwords are essential to keep your information safe from unauthorized access. This guide aims to simplify the process of changing your user password ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
10K+ Views
Introduction Ubuntu is a popular Linux operating system that gives users access to powerful tools for managing files, processes, and other system settings. One of the key features of Ubuntu is the ability to use "sudo" or "root" access to perform administrative tasks. This allows you to make changes to the system that would otherwise require special permissions. Sudo access is a type of temporary privilege escalation that allows a user to perform an action with administrative privileges. It requires the user's password before making any changes and is often used for one-time tasks like installing software. On the other ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
265 Views
Introduction Secure Shell (SSH) is a protocol that provides a secure channel over an unsecured network in Linux systems. It is commonly used for remote logins, file transfers, and executing commands on a remote machine securely. SSH is an essential tool for Linux system administrators, developers, and users who access their machines remotely. Checking Current SSH Port Before we can proceed to changing the SSH port, it is important to know the current port number being used. By default, the SSH service listens on port 22. However, this is a well-known port and is often targeted by attackers. Therefore, it ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
3K+ Views
Introduction Ethernet cards, also known as network interface cards (NICs), are hardware components that allow computers to connect to networks. These cards enable data transmission between devices by converting digital signals from a computer into electrical signals that can be sent over the network's physical medium, such as copper wires or fiber-optic cables. Ethernet cards are essential for accessing the internet, file sharing and printing in a local network. Understanding Ethtool Command Definition and Functionality Ethtool is a Linux command-line utility that allows users to query and change various network interface card (NIC) settings. It provides detailed information about the ... Read More