Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Articles by Satish Kumar
Page 70 of 94
Combine and Execute Multiple Linux Commands
Linux is a powerful and versatile operating system that has gained immense popularity in computing world. One of most useful features of Linux is ability to combine and execute multiple commands at once, which can significantly improve your productivity and efficiency. In this article, we will discuss various techniques for combining and executing multiple Linux commands, along with examples that demonstrate their practical applications. Combining Commands with Pipes The most common way to combine Linux commands is by using pipes. A pipe is a feature that allows output of one command to be passed as input to another command. syntax ...
Read MoreCommand Substitution in Bourne Shell
Introduction In world of Unix and Linux, Bourne shell is a popular and widely used command-line interface for interacting with operating system. One of most powerful features of Bourne shell is command substitution, which allows you to use output of one command as input for another. This article will explore command substitution in Bourne shell, including how it works, why it's useful, and some practical examples. What is Command Substitution? In Bourne shell, command substitution is a feature that allows you to take output of one command and use it as input for another command. This is done by enclosing ...
Read MoreHow to End Processes With kill, pkill, and killall
When working with a Unix-based operating system such as Linux or macOS, it is common to encounter situations where a process becomes unresponsive or needs to be terminated for some reason. Fortunately, there are several command-line utilities available that allow users to end processes in a variety of ways. In this article, we will explore three of most commonly used utilities for terminating processes: kill, pkill, and killall. We will cover their basic usage, common options, and examples of how they can be used to manage processes on a Unix system. Basic usage of kill, pkill, and killall Before diving ...
Read MoreConnecting From Docker Containers to Resources in Host
Introduction Docker is a popular platform that enables users to run and manage applications inside containers. Docker containers provide a lightweight and efficient way of isolating applications and their dependencies from underlying host system. However, in some cases, it may be necessary to connect from a Docker container to resources in host system. This article will discuss various ways to connect from Docker containers to resources in host. Accessing Host System By default, Docker containers are isolated from host system. This means that they cannot access any resources in host system unless specific configuration is done. following are some ways ...
Read MoreWhy Do We Use su – and Not Just su
Introduction The Linux operating system is a powerful tool that offers a wide range of features and functionalities to its users. One of most common tasks performed by system administrators on Linux systems is to switch to root user account using su command. However, in some cases, it is recommended to use su – instead of just su. In this article, we will explore reasons behind using su – and provide examples of how it can be beneficial. What is difference between su and su –? The su command is used to switch to another user account on system, typically ...
Read MoreEasy Ways to Determine Virtualization Technology
Virtualization technology has been a game-changer for IT industry, offering businesses and organizations an efficient and cost-effective solution to manage their IT infrastructure. Virtualization enables organizations to consolidate multiple servers into one physical host, reducing need for additional hardware and saving on energy and maintenance costs. Virtualization also allows organizations to quickly and easily create and manage virtual machines, enabling them to scale up and down as needed, and respond to changing business requirements. With increasing popularity of virtualization, businesses are faced with challenge of choosing right virtualization technology that best suits their needs. There are several virtualization technologies available ...
Read MoreLinux Kernel Versions 32-Bit vs 64-Bit
Introduction Linux is an open-source operating system that is widely used in servers, supercomputers, and embedded systems. kernel is core component of Linux, which controls all resources and services of system. Linux kernel comes in two versions, 32-bit and 64-bit, which have some significant differences. In this article, we will explore differences between these two versions and their impact on performance and capabilities of Linux. 32-Bit vs 64-Bit Architecture The terms 32-bit and 64-bit architecture refer to way that processors handle data. In a 32-bit architecture, processor can handle data in 32-bit chunks, while in a 64-bit architecture, processor can ...
Read MoreInstalling Java on Linux using SSH
Java is a popular programming language that is widely used for developing various types of software applications. Linux is one of most popular operating systems used for software development due to its stability, security, and open-source nature. In this article, we will discuss how to install Java on Linux using SSH. SSH (Secure Shell) is a secure network protocol used for remote login to a server. It allows users to log in to a remote server and perform various operations using command-line tools. This makes it an excellent choice for installing Java on a Linux machine. We will be using ...
Read MoreIntroduction to Iptables
Introduction to iptables Iptables is a Linux-based firewall application that controls incoming and outgoing traffic. It is a powerful tool that can be used to secure a server, limit access to specific applications or services, and mitigate risk of malicious attacks. This article will provide an introduction to iptables, its purpose, and its basic usage. What is iptables? Iptables is a firewall application that works with Linux kernel. It controls incoming and outgoing traffic and provides a mechanism to filter, block, or allow traffic based on various criteria, such as port number, IP address, protocol, and more. Iptables is designed ...
Read MoreTracking Down Where Disk Space Has Gone on Linux
As a Linux user, you might have come across a situation where you ran out of disk space, but you are not sure where all space has gone. It can be frustrating, but fortunately, there are several tools and techniques you can use to track down where disk space has gone on Linux. In this article, we will cover following sub-headings to help you identify where your disk space has gone − Check Disk Usage The first thing to do is to check disk usage of your system. Linux has several command-line tools that can help you do that. most ...
Read More