Tag Archives: linux-command

Often it’s necessary to trace memory usage of the system in order to determine the program that consumes all CPU resources or the program that… Read More
The grep filter searches a file for a particular pattern of characters, and displays all lines that contain that pattern. The pattern that is searched… Read More
Linux is a multi-user operating system, so it has security to prevent people from accessing each other’s confidential files. Introduction When you execute an “ls”… Read More
Unix is now one of the most commonly used Operating systems used for various purposes such as Personal use, Servers, Smartphones, and many more. It… Read More
ipcs shows information on the inter-process communication facilities for which the calling process has read access. By default, it shows information about all three resources:… Read More
dd is a command-line utility for Unix and Unix-like operating systems whose primary purpose is to convert and copy files. On Unix, device drivers for… Read More
Linux provides some important tricks. Here are a few and important one’s: leave — remind you when you have to leave Syntax: leave +hhmm leave… Read More
The crontab is a list of commands that you want to run on a regular schedule, and also the name of the command used to… Read More
ls is a Linux shell command that lists directory contents of files and directories.Some practical examples of ls command are shown below. 1. Open Last… Read More
Netstat command displays various network related information such as network connections, routing tables, interface statistics, masquerade connections, multicast memberships etc., Examples of some practical netstat… Read More
Computers are often connected to each on a network. They send request to each other in the form of packets that travels from the host… Read More
How to limit search a specified directory in Linux? There is a command in Linux to search for files in a directory hierarchy known as… Read More
Ccrypt is a command line tool for encryption and decryption of data. Ccrypt is based on the Rijndael cipher, the same cipher used in the AES… Read More
The recovery mode does not work always because many systems will ask for the root password for logging in. Now, since you do not know… Read More
This article will explore the basic Linux commands and how to use them. 1. ls: How would we know what a folder contains? With a… Read More