| by Arround The Web

How to Resize an Online Multipath Device on Linux

Disk space on Linux can be expanded by adding a new LUN or resizing an existing LUN on the system. In most cases, the online resizing of the multipath device …

The post How to Resize an Online Multipath Device on Linux first appeared on 2DayGeek.

Share Button
Read More
| by Arround The Web

snmpwalk Command in Linux

Guide on using the snmpwalk command in Linux, including the definition of SNMP, the basic function of SNMP, demonstration of the snmpwalk command, and its use.

Share Button
Read More
| by Arround The Web

How do I Check my NIC Speed in Linux?

NIC acts as a bridge between a computer system and the network. It has an associated speed that determines the quality of your interaction with the network.

Share Button
Read More
| by Arround The Web

Linux Rmdir Command Examples

The rm and rmdir are built-in command line utilities that are used when you need to remove directories. The use of rmdir command in Linux is discussed here.

Share Button
Read More
| by Arround The Web

20 mysqladmin Commands for MYSQL/MariaDB Database Administration

The post 20 mysqladmin Commands for MYSQL/MariaDB Database Administration first appeared on Tecmint: Linux Howtos, Tutorials & Guides .mysqladmin is a command-line database administration utility that comes with MySQL/MariaDB server, which is used by D…

Share Button
Read More
| by Arround The Web

Sed In Place Edit File

In UNIX/Linux ecosystem, the sed command is a dedicated tool for editing streams. This guide explores in-place file editing with sed.

Share Button
Read More
| by Arround The Web

How to Monitor Linux Users Activity with psacct or acct Tools

The post How to Monitor Linux Users Activity with psacct or acct Tools first appeared on Tecmint: Linux Howtos, Tutorials & Guides .psacct or acct both are open source utilities for monitoring users’ activities on the Linux system. These utilitie…

Share Button
Read More
| by Arround The Web

Where and How are Passwords Stored on Linux

A username and password for an account are the primary requirements for accessing a Linux system. All user accounts passwords are saved in a file or database.

Share Button
Read More
| by Arround The Web

Linux Check If Port Is Blocked by Firewall

A guide on checking if a port is blocked by a firewall using two commands that are the “telnet” and “nc” commands to connect to desired web servers.

Share Button
Read More
| by Arround The Web

How To Use Zenmap Nmap GUI

A guide on a brief introduction to Nmap and Zenmap and how to install and use Zenmap, the Nmap GUI graphical interface when displaying the commands.

Share Button
Read More
| by Arround The Web

10 Most Dangerous Commands – You Should Never Execute on Linux

The post 10 Most Dangerous Commands – You Should Never Execute on Linux first appeared on Tecmint: Linux Howtos, Tutorials & Guides .The command-line interface is a powerful and handy utility for administering a Linux system. It provides a fast and ver…

Share Button
Read More
| by Arround The Web

How to go up a Directory in Linux

This article will provide you a detailed guideline on how you switch from one directory to the other. You can learn multiple methods to perform this process.

Share Button
Read More
| by Arround The Web

How to Execute Binary Files in Linux

Binary files in Linux contain the information in the system that are needed to be executed. Read this article to get more details about it.

Share Button
Read More
| by Arround The Web

4 Ways to Find CPU Cores in Linux

CPU cores enhance the overall performance of the system. This article has discussed 4 different ways to find CPU cores in a Linux system.

Share Button
Read More
| by Arround The Web

How to Edit File in Linux

Two most common editors that you can use to edit a file in Linux are Nano and Vim editors. Read this article to know more about these two editors.

Share Button
Read More
| by Arround The Web

Different Methods to Check OS Version in Linux

There are multiple ways to check the OS version in Linux. Some of the main methods have been discussed in detail in this article for your guidance.

Share Button
Read More
| by Arround The Web

Free Command in Linux

The “free” command in Linux-based systems looks promising as it shows you the amount of RAM or memory used by your system.

Share Button
Read More
| by Arround The Web

How to Check the sshd Logs in Linux?

Using sshd logs, you can monitor authorized and unauthorized login attempts on your system. How to check the sshd logs in Linux is discussed.

Share Button
Read More
| by Arround The Web

Commands to Sync Time with NTP Server in Linux

Network Time Protocol (NTP) is an authentic way to synchronize the clock over a network. Find details about commands to sync time with NTP in this guide.

Share Button
Read More
| by Arround The Web

Linux PAM Tutorial

A guide on using the high-level API known as PAM in Linux for dynamic authentication support using many secure systems that are user-friendly and dependable.

Share Button
Read More