This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Linux provides quite a few useful commands for gauging disk activity. The dstat command provides valuable insights into overall Linux system performance, pretty much replacing a collection of older tools, such as vmstat, netstat, iostat, and ifstat, with a flexible and powerful command that combines their features. iostat Linux 6.8.9-100.fc38.x86_64
Linux provides a useful array of commands for managing file permissions, getting information on commands, displaying running processes and displaying details on the system itself. The chmod command will, for example, allow you to make a file executable, which is important when you prepare a script to automate some routine task.
User groups on Linux systems are often set up to provide access permissions to specific groups of users who share some responsibility. For example, a particular group of users may be allowed to run commands with superuser privilege or access a group of shared files. Some of the groups may include a list of users (e.g.,
There are many types of files on Linux systems and numerous ways to look at them, from listing permissions to viewing content. Permissions and ownership Listing files on Linux with the ls -l command provides information on the file’s owner and associated group. Here’s an example: $ ls -l total 4 lrwxrwxrwx.
There are many ways to evaluate disk space usage on Linux, and this post examines a number of commands that allow you to view used and available disk space. Heres an example: $ sudo fdisk fdisk: bad usage Try 'fdisk --help' for more information. Linux filesystem Disk /dev/zram0: 3.7 Linux filesystem Disk /dev/zram0: 3.7
Getting started on the Linux command line might seem overwhelming at first, but the many commands you need to use will fall into place more quickly than you might imagine. First, when you open a command terminal or log into a remote Linux server, you will be sitting at the command prompt. Linux systems tend to be fussy about passwords.
Red Hat is out this week with the latest milestone update of its flagship Linux platform. Red Hat Enterprise Linux 9.5 Red Hat Enterprise Linux 9.x Red Hat Enterprise Linux 9.x Firewalld is a commonly used Linux firewall service while notables provides filtering and classification of network packets.
There are a number of commands on Linux that you can use to manage user accounts and monitor user activity. This post provides details on the commands that you need to know if you are managing a Linux server and the user accounts on that system. ls -l /usr/sbin/useradd /usr/sbin/adduser lrwxrwxrwx.
Linux admins who have enabled the unprivileged user namespace restriction in their recent Ubuntu environments should take action to close three new vulnerabilities that allow a threat actor to bypass the supposed protection. It didnt quite do that. Ubuntu says admins of releases after version 23.10
Some Linux commands can make your time on the command line easier and more productive. Using the tldr command to simplify man pages The tldr command displays simplified man pages, providing practical examples of how to use a command and its options. Note that explanations of various options are provided along with the example commands.
There are quite a few tools that can help test your connectivity on the Linux command line. This post provides intros and example output from these commands: ping traceroute mtr ncat speedtest fast nethogs ss iftop ethtool ping The ping command is the simplest and most often used command for doing basic connectivity testing. .
The sed command on Linux can be used in quite a few different ways. For example, to change I want to I do not want in a string, you could use a command like the one shown below that demonstrates how it would work. This stream editor (as the name implies) provides options to help you manipulate text very efficiently.
This post examines eight somewhat unusual Linux commands that are worth knowing. The shuf command The shuf command will randomly shuffle the lines in a file as shown in the examples below. Heres an example. Just run a command like this and you wont have to type yes to whatever questions it will ask: $ yes | scriptname 2.
There are quite a few ways to extract words and substrings from lines of text on a Linux system, replace them with other strings, select delimiters, and even get rid of white space at the beginning and end of lines. In the following example, two delimiters are specified, so the awk command accepts either a colon or a blank to separate fields.
Open source and Linux platform vendor SUSE is looking to help organizations solve some of the complexity and challenges of edge computing with the company’s SUSE Edge 3.1 SUSE Edge integrates SUSE Linux Micro, which is an optimized Linux distribution for smaller deployments based on the company’s flagship SUSE Linux Enterprise (SLE).
Deploying password-quality checking on your Debian-based Linux servers can help ensure that your users assign reasonably secure passwords to their accounts, but the settings themselves can be a bit misleading.
The power of working on the Linux command line is evidenced nearly as much by the available operators as it is by the awesome collection of available commands. This post gives details and provides examples of how these many operators work. Notice that, in the example above, the content of the file is replaced.
For example, the assistant can generate answers to IBM Z users’ questions in Z-specific content as well as recommend relevant automated skills that can be acted upon during the conversation. Going forward, IBM said it intends to develop an IBM watsonx Assistant for Z that runs on IBM Linux on Z.
The pv command is a rather unusual Linux command, but it can provide some insights into commands, especially those that send data through pipes. In this first example, the pv command with the -p (progress) option is examining a file and sending the data through a pipe to the wc command. $
The rm (remove) command is the most obvious way to remove files that you no longer need on your Linux system, and it includes some very useful options. The rm command The rm command simply removes a file and is one of the basic commands that just about every Linux user needs on a routine basis. There are complications, however.
Whenever you run a command in a Linux terminal, a numeric exit code is generated – even if you see no sign of it. command as shown in the examples below. echo Linux is wonderful Linux is wonderful $ echo $? 127 The exit code 126, for example, means that an issued command could not be executed.
There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems. sudo adduser shark Adding user `shark'.
Rerunning commands on the Linux command line isn’t hard, but there are a number of ways to do it. This post provides eight examples of how to repeat commands on Linux, with and without changes. Here are a couple examples: $ pwd /home/myacct $ !! Here is an example: $ echo this is not a test this is not a test $ echo !$
The Linux find command makes it easy to find files on your system – even if you don’t remember their names or exactly when you last updated them. find [starting point] [what to look for] [what to display] Finding files by name A very basic example of a find command might look like this: $ find. For example -mtime -2 or -mtime +4.
There are several ways to loop “forever” on Linux commands. This post provides some examples of how to do this. while : do echo Keep running echo "Press CTRL+C to exit" sleep 3 done You can do the same thing in a single line by separating the lines shown above with semicolons as shown in the example below. It’s quite easy.
Linux provides a number of commands that provide information about disk and system activity along with system and resource stats. In the example below, we’re asking for two-second intervals and six reports. One of the most useful commands is dstat. It provides an extensive number of detailed statistics on system activity.
Take Linux or Kubernetes, for example. The Cloud Native Computing Foundation (CNCF) and Linux Foundation have announced an OpenTelemetry certification aimed at validating the skills needed to utilize OTel in order to gain visibility across distributed systems. Others fall by the wayside remember the Ubuntu Phone?
This post examines a number of commands that can help you view and understand user logins and the time users spend on your Linux servers. This example shows two users are logged in from different systems. $ Use the -d option to view daily login totals as in this example: $ ac -d | tail -5 Aug 27 total 222.68 But that’s not all.
Running commands in the Linux terminal is likely something you do nearly every day, but moving a running process into the “background” and later moving it back into the “foreground” is something different altogether. Going between foreground and background In the example scenario below, we start two processes and stop each with a ^z.
Command history on Linux allows you to review and repeat previous commands with little effort. Here’s an example: $ !15 Here’s a simple example: $ echo 1 1 $ echo 2 2 $ echo 3 3 $ !e It is built into the bash shell (included in the shell executable). This will choose the most recent command that matches the letters you type.
Getting your Linux system to send print jobs to your local printer might seem like a challenge, especially when you want to print double-sided or in landscape mode, but it’s really a lot easier than you might imagine. In this example, there is only one printer. Even the colors of the toner cartridges are included in this example.
Here’s an example: $ zip bin bin/* updating: bin/FindFiles (deflated 54%) updating: bin/shapes (deflated 63%) updating: bin/shapes2 (deflated 62%) updating: bin/shapes3 (deflated 45%) updating: bin/NOTES/ (stored 0%) Here’s an example that adds -r and, as a result, includes the NOTES subdirectory’s files in the bin.zip file is it creating. $
Displaying the current date The Linux date command is extremely versatile. Here’s an example: $ date Thu Jul 4 10:58:54 AM EDT 2024 Seeing date information for any date If you want to see details on a date in the past or in the future, use the -d option. D – Date as mm/dd/yy %Y – Year (e.g., November) %b – Short month name (e.g.,
If you need to log out of your Linux system from within a script, things get a little complicated. Here’s an example. Exiting a script and logging out are very different. There are, however, two ways to manage this. The script shown below was intended to log out the person running it once three users were logged into the system.
There are many ways to change text on the Linux command line from lowercase to uppercase and vice versa. In fact, you have an impressive set of commands to choose from. This post examines some of the best commands for the job and how you can get them to do just what you want.
This post includes examples of each of these options, ranging from simple to fairly complicated. Here’s an example: #!/bin/bash In this example, we’re using a for loop inside a while loop. #!/bin/bash The looping options provided by bash include for loops, while loops and until loops.
There are numerous ways to compare text files on a Linux system from the command line. In the example below, you will see some complaints when non-sorted file content is used. In the first example, you can see that the content of both files is the same. It expects the file content to be in sorted order.
There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems. sudo adduser shark Adding user `shark'.
For example, you could test a variable and take an action based on its value in a script like this: #!/bin/bash Instead of composing a long group of code lines that would allow you to test a variable against a number of potential values, you could write a terse and delightfully readable chunk of code that’s easy to put together.
The open-source eBPF (extended Berkeley Packet Filter) technology has become one of the most critical foundational elements of networking with Linux over the last decade. The open-source eBFP technology enables users to run code safely in the Linux kernel. Soon that same power will reach out to embrace Microsoft Windows, too.
I think obvious use cases for AI, given the transactional nature of the workloads on the platform, [include] fraud management, for example, being able to run IBM Granite AI, small language models in transaction. IBM will also add a new version of its watson X Code Assistant for Z to help developers modernize mainframe applications.
Execute permissions should be assigned with the chmod command so that only the proper groups can run it, as shown in the examples in the table below. For example, if you type myscript Tuesday 11AM , the script can use those day-of-week and time-of-day values. IDG Using quotes Single and double quotes can be used in Linux commands.
In a blog about the need for an Internet of Agents, Panday cited a real-world enterprise IT example: In enterprise IT, deploying a sales forecasting SaaS platform requires collaboration across multiple AI agents. This is a pretty straightforward example, but thats what were getting into.
This year, for example, the themes in each successive week are: Be Cyber Smart. Linux security: Cmd provides visibility, control over user activity. Since then NCSAM has grown into an event-packed month with star-studded guest panels, annual launches in various cities (looking at you, Ypsilanti, Michigan!), Phight the Phish!
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content