- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1437 Articles for Linux
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
845 Views
SystemD is a system and service manager for Linux operating systems. It manages the boot process, system services, and provides a centralized way to manage processes. One of the key features of SystemD is its use of runlevels (targets) to define the state of the system at startup. Runlevels (targets) are a set of services and processes that are started or stopped depending on the current state of the system. Understanding how to change runlevels (targets) is an important skill for any Linux administrator. Understanding Runlevels (Targets) In the traditional Unix system, runlevels were used to determine which set of ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
411 Views
Introduction As with any password, the root user password for a MySQL or MariaDB database should be changed regularly for security reasons. The root user has complete access and control over all databases and tables within the system, making it a prime target for any potential attacks. Regularly changing the root password can help prevent unauthorized access to your data, as well as provide an added layer of security against potential server breaches. Checking Current Root Password A root user is a powerful administrator account that has full access to the MySQL or MariaDB server. It is important to regularly ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
1K+ Views
Introduction Jenkins is an open-source automation server that helps developers build, test, and deploy their software. It is one of the most popular tools in the DevOps world due to its flexibility, ease of use, and extensive plugin ecosystem. When you install Jenkins, it uses a default port number (8080) to listen for incoming HTTP requests. However, sometimes this port can conflict with other applications on your system or may not be suitable for your environment's security needs. In such cases, changing the port number is necessary. Understanding Ports Before we dive into the steps of changing the port for ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
582 Views
Introduction In computer networking, a hostname is a label that is used to identify devices connected to a network. It is essentially a human-readable name assigned to a device, which can be used instead of its IP address. Hostnames are important because they make it easier for users on the network to access other devices by name rather than having to remember the IP addresses of each device. Hostnames are also crucial for network communication and resource sharing. When two devices communicate on a network, they typically use their hostnames to identify themselves rather than their IP addresses. This makes ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
208 Views
Introduction In today's world, security is one of the top priorities for any organization. The consequences of a security breach can be catastrophic, leading to loss of critical data, financial losses, and reputational damage. One way to ensure that your Windows Server environment stays secure is by maintaining strong passwords for your administrator accounts. As the administrator account has elevated privileges and access to sensitive data and systems in the network, it's crucial to secure it with a strong password that can't be easily guessed or cracked by attackers. A weak password is akin to leaving the front door open ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
2K+ Views
Introduction Nginx is a popular open-source web server that is known for its speed, reliability, and scalability. The default port for Nginx is 80, which allows web traffic to flow in and out of the server. While this port works well in most cases, it can also make the server vulnerable to cyber attacks since it is a well-known port that hackers target. Checking Current Nginx Configuration Step-by-Step Guide on How to Check Current Nginx Configuration Before changing the Nginx port, it is important to ensure that the current configuration is correct. To check the current Nginx configuration, follow these ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
285 Views
Introduction Kernel runtime parameters are settings that control the behavior of the Linux kernel on your system. These parameters can affect a wide range of system functions, such as memory allocation, network performance, and CPU scheduling. Understanding how to change these parameters is crucial for optimizing system performance and troubleshooting issues that may arise. There are two main ways to change kernel runtime parameters: non-persistent changes and persistent changes. Non-persistent changes modify the kernel's behavior temporarily, lasting only until you reboot your system. Persistent changes, on the other hand, modify the kernel's behavior permanently and persist across reboots. Changing Kernel ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
785 Views
Introduction Jenkins is a popular automation server that helps automate tasks in the software development process. The Jenkins Home Directory, also known as JENKINS_HOME, is the location where all of the configuration files, plugins, and other essential files are stored. This directory plays a significant role in maintaining the stability and performance of the Jenkins environment. But there may be situations where you need to change the Jenkins Home Directory location. Preparing to Change Jenkins Home Directory Understanding the Current Jenkins Home Directory Location Before changing the Jenkins Home Directory, it is important to understand where it is currently located. ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
433 Views
Introduction Have you ever heard the term "hostname" and wondered what it means? In simple terms, a hostname is the unique name that identifies a device on a network. It allows other devices to locate and connect to it, making it an essential component of any network setup. Whether you're running a small home network or managing multiple servers in an enterprise environment, understanding how to change the hostname can come in handy. In this article, we'll explore how to change the hostname on Ubuntu 20.04 – one of the most popular Linux distributions used today. We'll cover two methods: ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
504 Views
Introduction A hostname is the unique identifier of a device in a network, typically used to identify and connect to other devices on the same network. In other words, it is a label given to a computer or device that enables it to be uniquely identified when connected to the internet or any other network. In most cases, when your device is connected to the internet or a local network, it gets assigned a hostname by default. However, there are situations where you may need or want to change the hostname of your Ubuntu 18.04 machine. For instance, if you ... Read More