- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1437 Articles for Linux
![Prince Yadav](https://www.tutorialspoint.com/assets/profiles/509603/profile/60_901093-1661846059.jpg)
124 Views
In this tutorial, we will explore CRLFuzz, a powerful Linux tool written in Go that allows us to scan and identify CRLF (Carriage Return Line Feed) vulnerabilities. CRLF vulnerabilities occur when web applications mishandle the line termination characters, leading to potential security risks such as HTTP response splitting, cross-site scripting (XSS), and session hijacking. By using CRLFuzz, we can effectively scan for these vulnerabilities and strengthen the security of our web applications. Throughout this tutorial, we will cover the installation process, demonstrate the usage of CRLFuzz with various command-line options, and explain the significance of the code snippets and their ... Read More
![Prince Yadav](https://www.tutorialspoint.com/assets/profiles/509603/profile/60_901093-1661846059.jpg)
886 Views
In this tutorial, we will explore the process of creating dialog boxes using the Dialog tool in Linux. Dialog is a command-line utility that allows developers to easily incorporate interactive dialog boxes into their shell scripts or applications. These dialog boxes provide a user-friendly interface for displaying information, receiving input, and making selections. By using the Dialog tool, we can enhance the interactivity and usability of our Linux programs. Throughout this tutorial, we will walk through the steps required to install and use the Dialog tool effectively. We will start with the installation process, explore different types of dialog boxes ... Read More
![Prince Yadav](https://www.tutorialspoint.com/assets/profiles/509603/profile/60_901093-1661846059.jpg)
144 Views
In this tutorial, we will explore a powerful tool called Cr3dOv3r, which is used for conducting credential reuse attacks. Cr3dOv3r is specifically designed for Kali Linux, a popular Linux distribution widely used for penetration testing and ethical hacking purposes. In this article, we will delve into the functionalities and usage of Cr3dOv3r, providing step-by-step instructions along with code snippets and their explanations. By the end of this tutorial, you will have a solid understanding of how to leverage Cr3dOv3r to identify potential credential reuse vulnerabilities and enhance the security of your systems. Installation and Setup of Cr3dOv3r To begin, let's ... Read More
![Prince Yadav](https://www.tutorialspoint.com/assets/profiles/509603/profile/60_901093-1661846059.jpg)
86 Views
Transferring Linux binaries from one system to another can be a challenging and time-consuming task, especially when you need to install the software on multiple machines. However, there is a tool available that simplifies this process - Exodus. It is a powerful tool that allows you to export and import software packages, including binaries and their dependencies, from one Linux system to another. In this article, we will explore the steps involved in using Exodus to copy Linux binaries from one system to another. We'll cover essential steps such as identifying the location of binaries and dependencies, creating an archive ... Read More
![Prince Yadav](https://www.tutorialspoint.com/assets/profiles/509603/profile/60_901093-1661846059.jpg)
124 Views
In this tutorial, we will explore Collectl, a powerful performance analysis tool for Linux systems. Collectl provides comprehensive monitoring capabilities, allowing us to gather and analyze system performance metrics in real-time. Throughout this article, we will learn how to install Collectl and utilize its features to monitor various system resources, including CPU, memory, disk, and network usage. Installing Collectl To begin, let's install Collectl on our Linux system by following these steps − Step 1 − Open a terminal window on your linux machine. Step 2 − Update the package repository by running the following command − sudo apt update By executing the above command, ... Read More
![Prince Yadav](https://www.tutorialspoint.com/assets/profiles/509603/profile/60_901093-1661846059.jpg)
138 Views
When managing our Linux systems, one of the most crucial things to consider is how we manage our disk space. Many of us are not aware of this, As we accumulate files and directories on our system, it's easy to lose track of what's taking up space and how to optimize our disk usage. But don't worry, that's where dutree comes in handy! In this article, we'll look into dutree in detail. We'll cover what it is, how to use it, and what benefits it offers for analyzing disk usage in Linux systems. Whether you're a Linux beginner or an ... Read More
![Diksha Patro](https://www.tutorialspoint.com/assets/profiles/586222/profile/60_1257779-1673957458.jpeg)
1K+ Views
Introduction A system with more than one user (OS) is an operating system for computers that enables several individuals to communicate via the computer's infrastructure at the same time. Multiple users may utilize one machine or system of computers at the same time in an operating system designed for multiple users, alongside every individual getting a separate account while being able to carry out duties of their own. Multi-user systems of operation are frequently employed in circumstances in which multiple users must share identical materials or information and where interaction and cooperation are essential. Systems like these serve a purpose ... Read More
![Diksha Patro](https://www.tutorialspoint.com/assets/profiles/586222/profile/60_1257779-1673957458.jpeg)
1K+ Views
Introduction The "move" control in Microsoft Windows the Command Prompt can be helpful for moving archives or files from a single spot to a different one. This serves as a simple yet strong control that is able to be utilized to organize and handle your documents and folders as well. The basic syntax associated with the "move" control is the command itself accompanied by the location of the source record or database as well as the location of the new record or directory. The point of origin is the document or database you desire to relocate, as well as the ... Read More
![Diksha Patro](https://www.tutorialspoint.com/assets/profiles/586222/profile/60_1257779-1673957458.jpeg)
4K+ Views
The find command in Linux is used to look for files and directories inside a directory structure. The find command's min depth and max depth arguments let you restrict the search to a certain directory or depth level. Max depth defines the maximum depth level up to which the search should be conducted, whereas min depth specifies the least depth level from the starting directory where the search should begin. These choices can help you focus your search to a certain directory or depth level within a complicated directory structure. What are min depth and max depth levels? max depth ... Read More
![Diksha Patro](https://www.tutorialspoint.com/assets/profiles/586222/profile/60_1257779-1673957458.jpeg)
139 Views
The add user command in Linux is used to add new user accounts on operating systems that resemble Unix. It is frequently used by system administrators to add new users with predetermined usernames, passwords, and other user-related information System calls Software can communicate with the kernel of the operating system, which manages system resources and provides services to user-level programs, through system calls. System calls are used in C programming to gain access to the features and services provided by the operating system, including file I/O, process management, network connectivity, and more. To interact with the operating system, C programmers ... Read More