Configure a Password-less Sudo

I can bet that we are all familiar with sudo. It is a utility available in most Linux distributions and being adopted by those that haven’t implement it yet. Therefore, if you are a regular Linux user, sudo is a must-use tool. Sudo is a…

How to Get md5 Hash Of A File

Message-Digest algorithm, commonly known as md5 hash, is a type of cryptographic hash function mainly used to verify the integrity of files. Md5 is a 128-bit message digest produced after running the MD5 function against a file. Md5 has its…

Edit Etc/Hosts Linux

In various instances, you will need to edit the host file in the system. That can be to either use it as a firewall, i.e., control some network traffic, add a domain name, or test out its functionality. The host file is a local file or…

Find Hostname from IP Linux

Names or labels are useful as they allow us to identify one thing or one person from another. Even a person’s name, which might not be globally unique, contains a set of characters that allow a person to become distinguished from another…

How to Check Open Files in Linux

You may have come across the saying, “Everything is a file in Linux.” Although this is not entirely true, it does hold a set of truths to it. In Linux and Unix-like systems, everything is like a file. That means the resources in the Unix…

Fix Bad Owners or Permission on .ssh/config

We all love SSH! It is a powerful tool that we use to interact with remote machines and perform heavy tasks at the comfort of our local terminal. Due to the comfort and control that SSH gives us, we try to implement methods such as…

What Do the Colors Mean in Htop

Htop is one of the greatest task managers for Linux systems. Okay, I am a little biased as I have actively contributed to its code. However, I think we can agree that htop is a great tool for monitoring and understanding what is going on…

Send a Process to Background Linux

When working with graphical desktop environments, we rarely worry about background processes. If we have a process running in the foreground, we can quickly spawn another terminal window and continue with our work. However, if you are in a…

SCP Recursively

Secure copy or SCP is a command-line utility that allows users to transfer files and directories securely from one machine to another over SSH protocol. SCP is handy as it is easy to use. Some of the features of using SCP to transfer files…

How to List and Selectively Remove Snapshots

The lvm tool is used to create, manage, and visualize logical volumes, file systems, and snapshots in a system. In this tutorial, we will use the lvm tool to display detailed information of the logical volumes, volume groups, and snapshots…

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More