Are you over 18 and want to see adult content?
More Annotations
A complete backup of marriotthawaii.com
Are you over 18 and want to see adult content?
A complete backup of houseofkaizen.com
Are you over 18 and want to see adult content?
A complete backup of tadaktadak.co.kr
Are you over 18 and want to see adult content?
A complete backup of sixriversconferencewi.org
Are you over 18 and want to see adult content?
A complete backup of prioritysign.com
Are you over 18 and want to see adult content?
A complete backup of nexusparkingsystems.com
Are you over 18 and want to see adult content?
Favourite Annotations
SALVATION CHURCH OF GOD, INC. – Welcome! Nyob Zoo!
Are you over 18 and want to see adult content?
פורטל תינוק ישראלי - הריון, לידה והורות צעירה - הריון ולידה
Are you over 18 and want to see adult content?
Empresa de Recrutamento e Seleção I Michael Page
Are you over 18 and want to see adult content?
Easy Cooking with Molly - Light Family Favorite & Global Recipes
Are you over 18 and want to see adult content?
Text
columns.
DNS TROUBLESHOOTING IN LINUX Mr Surendra Anne is from Vijayawada, Andhra Pradesh, India. He is a Linux/Open source supporter who believes in Hard work, A down to earth person, Likes to share knowledge with others, Loves dogs, Likesphotography.
LINUX SHELL SCRIPT TO LIST USERS IN A SYSTEM This is a small script/command to list users in the machine. Some times it’s required to check how many users are there in the system and list them all or count the users. Simplest way is to use builtin command compgen. To list users by using this command use -u WHAT IS A STICKY BIT AND HOW TO SET IT IN LINUX? What is Sticky Bit? Sticky Bit is mainly used on folders in order to avoid deletion of a folder and it’s content by other users though they having write permissions on the folder contents. If Sticky bit is enabled on a folder, the folder contents are deleted by only owner who created them and the root user. 5 DIFFERENT WAYS TO DISPLAY IP ADDRESSES IN CENTOS 7 In this article, we will look at five different ways by which we can display the IP address information about our server. For the purpose of this demonstration, we will be working on a Centos 7 system. Method 1: Using ifconfig command. The ifconfig command is the most commonly used command for displaying and modifying IP addresses on the system. WHAT IS SUID AND HOW TO SET SUID IN LINUX/UNIX? SUID ( S et owner U ser ID up on execution) is a special type of file permissions given to a file. Normally in Linux/Unix when a program runs, it inherit’s access permissions from the logged in user. SUID is defined as giving temporary permissions to a user to run a program/file with the permissions of the file owner rather that theuser who
HOW TO READ OR VIEW UTMP, WTMP AND BTMP FILES IN LINUX View utmp, wtmp and btmp files In Linux/Unix operating systems everything is logged some where. Most of the system logs are logged in to /var/log folder. This folder contains logs related to different services and applications. In this folder we have some files such as utmp, wtmp and btmp. These files contains all the details FIND USB DEVICE DETAILS IN LINUX/UNIX USING LSUSB COMMAND Today we will see how to list USB devices in Linux and their properties such as speed, BUS, class, type details etc. This is part of our on going hardware detection series. We already covered following stuff. Get BIOS, Firmware, Hardware And Drivers Details in Linux/Unix What is dmesg command and how to use it AWK SCRIPTING: 10 BEGIN AND END BLOCK EXAMPLES AWK tool is mainly used for reporting some data in useful manner. With out these BEGIN and END blocks the output will be meaning less. In this post we will see different ways to use BEGIN and END blocks. For this post the example file is db.txt which contains below data: Jones 2143 78 84 77. Gondrol 2321 56 58 45. HEARTBEAT CLUSTERING IN LINUX Step1 : Install the following packages in the same order which is shown. If you did not find the packages online you can download it from our site, click here to download the packages. Step1 (a) : Install the following packages on node1. #rpm -ivh heartbeat-2.1.2-2.i386.rpm. AWK SCRIPTING: 8 AWK PRINTF STATEMENTS EXAMPLES awk ' {printf "format", Arguments}' filename. For example you want to print decimal values of column 3 then the example will be. awk ' {printf "%d", $3}' example.txt. Printf can do two things which AWK print command can’t. 1)Defining type of Data. 2)Padding betweencolumns.
DNS TROUBLESHOOTING IN LINUX Mr Surendra Anne is from Vijayawada, Andhra Pradesh, India. He is a Linux/Open source supporter who believes in Hard work, A down to earth person, Likes to share knowledge with others, Loves dogs, Likesphotography.
LINUX SHELL SCRIPT TO LIST USERS IN A SYSTEM This is a small script/command to list users in the machine. Some times it’s required to check how many users are there in the system and list them all or count the users. Simplest way is to use builtin command compgen. To list users by using this command use -u WHAT IS A STICKY BIT AND HOW TO SET IT IN LINUX? What is Sticky Bit? Sticky Bit is mainly used on folders in order to avoid deletion of a folder and it’s content by other users though they having write permissions on the folder contents. If Sticky bit is enabled on a folder, the folder contents are deleted by only owner who created them and the root user. 5 DIFFERENT WAYS TO DISPLAY IP ADDRESSES IN CENTOS 7 In this article, we will look at five different ways by which we can display the IP address information about our server. For the purpose of this demonstration, we will be working on a Centos 7 system. Method 1: Using ifconfig command. The ifconfig command is the most commonly used command for displaying and modifying IP addresses on the system. WHAT IS SUID AND HOW TO SET SUID IN LINUX/UNIX? SUID ( S et owner U ser ID up on execution) is a special type of file permissions given to a file. Normally in Linux/Unix when a program runs, it inherit’s access permissions from the logged in user. SUID is defined as giving temporary permissions to a user to run a program/file with the permissions of the file owner rather that theuser who
HOW TO READ OR VIEW UTMP, WTMP AND BTMP FILES IN LINUX View utmp, wtmp and btmp files In Linux/Unix operating systems everything is logged some where. Most of the system logs are logged in to /var/log folder. This folder contains logs related to different services and applications. In this folder we have some files such as utmp, wtmp and btmp. These files contains all the details FIND USB DEVICE DETAILS IN LINUX/UNIX USING LSUSB COMMAND Today we will see how to list USB devices in Linux and their properties such as speed, BUS, class, type details etc. This is part of our on going hardware detection series. We already covered following stuff. Get BIOS, Firmware, Hardware And Drivers Details in Linux/Unix What is dmesg command and how to use it 5 LINUX ALIAS COMMAND EXAMPLES Let us start learning Linux alias command with examples. Example1: Create an alias for getting memory states on the machine. Alias RAM=’free -m’. Output: $ alias RAM='free -m'. linuxnix@ssh01 ~]$ RAM. total used free shared buffers cached Mem: 15936 521 15414 0 137 157 -/+ buffers/cache: 225 15710 Swap: 8039 08039
LINUX DIRECTORY STRUCTURE EXPLAINED: /BIN FOLDER This is second post in our Linux directory explanation series. /bin is one more important folder. Bin stands for binary which means an executable file. This folder contains commands or scripts or executable which can be executed to accomplish a task. We have some cousins to this folder as given below along with bin folder. /bin /sbin /usr/bin /usr/sbin HOW TO READ OR VIEW UTMP, WTMP AND BTMP FILES IN LINUX View utmp, wtmp and btmp files In Linux/Unix operating systems everything is logged some where. Most of the system logs are logged in to /var/log folder. This folder contains logs related to different services and applications. In this folder we have some files such as utmp, wtmp and btmp. These files contains all the details 4 COMMANDS YOU SHOULD KNOW TO COMPRESS FILES IN LINUX The gzip, xz, and bzip2 commands are very similar. The biggest difference is the technique used to compress files. The gzip command uses the Lempel-Ziv (LZ77) coding method, whereas the bzip2 command uses the Burrows-Wheeler (BWT) block HOW TO ENABLE VERBOSE MODE FOR SSH LOGINS? How we can login to remote server through ssh? #ssh user@servername or #ssh -l user servername or #ssh ip-add So when you will execute the above command you will get the password prompt. But if you want to see what will happen when you execute ssh command you have to enable verbose or debugging mode. 9 LINUX READ COMMAND EXAMPLES FOR SHELL SCRIPTING As most of you know, we can define variables in our shell scripts to make our scripts more independent of hard coding. Below are they ways we can assign values to variables in a shell script Defining variables in the script: Assigning predefined constants to variables with the script. Before executing a script: Using positional EMBEDDING EXCEL/CSV FILE IN EMAIL FROM LINUX CLI Recently I was working with something and got into a situation where I wanted to embed some content to an email body and trigger it from a Linux server via command line inputs. We can do it using any of the Email-Clients until the file is an Excel(CSV) format and needed tosend it as an
WHAT IS A STICKY BIT AND HOW TO SET IT IN LINUX? What is Sticky Bit? Sticky Bit is mainly used on folders in order to avoid deletion of a folder and it’s content by other users though they having write permissions on the folder contents. If Sticky bit is enabled on a folder, the folder contents are deleted by only owner who created them and the root user. FIND USB DEVICE DETAILS IN LINUX/UNIX USING LSUSB COMMAND Today we will see how to list USB devices in Linux and their properties such as speed, BUS, class, type details etc. This is part of our on going hardware detection series. We already covered following stuff. Get BIOS, Firmware, Hardware And Drivers Details in Linux/Unix What is dmesg command and how to use it HOW TO CHECK A SERVICE IS RUNNING OR NOT IN LINUX? The w is an excellent command which will give you a quick overview of 1) Users logged in. 2) What they are doing. 3) CPU stats. w command is similar to who command with bit of variation. The who command will not give information about what application/command an user is HOW TO SEARCH MULTIPLE FILES WITH GREP Search for a string in multiple files using grep Today we came across a requirement to check all the files in a directory for a specific entry. The situation is like this. We have two public DNS servers, we usually take backups of zone files when ever we do some changes tozone files. So
BASIC LINUX COMMANDS INTERVIEW QUESTIONS 1)Give me 15 commands which you use frequently. Depends on the environment you work. Some examples are. mkdir — For creating folders( use -p option to create multiple folders at a time) ls –List folders/files( check what ls -1 do). top — To monitor system activities. lsof –To check whats happening on the server and which process open which file.. netstat-tcp –Gives you complete DOCKER ENGINE EXPLAINED Introduction. In our last post, we explained how docker works on a client-server architecture and also talked about the different docker components.In this article, we will discuss the docker engine itself in greater detail. The docker engine is the heart of what runs andmanages containers.
4 COMMANDS YOU SHOULD KNOW TO COMPRESS FILES IN LINUX A common task on most modern operating systems is to combine and compress multiple files into a single file. This could be in order to store files on a smaller device, to make it easy to download files from a website, or to merge and compress files for email transport. This guide focuses on some HOW TO ENABLE VERBOSE MODE FOR SSH LOGINS? How we can login to remote server through ssh? #ssh user@servername or #ssh -l user servername or #ssh ip-add So when you will execute the above command you will get the password prompt. But if you want to see what will happen when you execute ssh command you have to enable verbose or debugging mode. CONTAINERIZATION AND ORCHESTRATION CONCEPTS EXPLAINED Introduction Containerization and orchestration technologies have immensely contributed to the revolution of mainstream IT and continue to play a pivotal role in the rise of DevOps culture across organizations. Before we started working with containers it’s important to understand what they are and how they work before diving deep into the implementation part of the EMBEDDING EXCEL/CSV FILE IN EMAIL FROM LINUX CLI Recently I was working with something and got into a situation where I wanted to embed some content to an email body and trigger it from a Linux server via command line inputs. We can do it using any of the Email-Clients until the file is an Excel(CSV) format and needed tosend it as an
GIT: HOW TO SET OR CHANGE DEFAULT EDITOR? Example: I want to set vim as my default editor to do that follow below command. git config --global core.editor vim. change default GIT editor by editing ~/.gitconfig. Enter below entry in to the file under section. editor = vim. Check if your editor is updated or not with following commands. git config core.editor. 7 INTERVIEW QUESTIONS FOR INFRASTRUCTURE OPERATIONAL Below are some of the typical interview questions you will come across when you apply for an infrastructure operational/Devops manager job. We are providing answers as a reference and these no need to be correct in your situation. They will just aid on how you can approach these type of questions. We usually do not SHELL SCRIPT TO CREATE AND CHANGE THE DIRECTORY Mr Surendra Anne is from Vijayawada, Andhra Pradesh, India. He is a Linux/Open source supporter who believes in Hard work, A down to earth person, Likes to share knowledge with others, Loves dogs, Likesphotography.
HOW TO SEARCH MULTIPLE FILES WITH GREP Search for a string in multiple files using grep Today we came across a requirement to check all the files in a directory for a specific entry. The situation is like this. We have two public DNS servers, we usually take backups of zone files when ever we do some changes tozone files. So
BASIC LINUX COMMANDS INTERVIEW QUESTIONS 1)Give me 15 commands which you use frequently. Depends on the environment you work. Some examples are. mkdir — For creating folders( use -p option to create multiple folders at a time) ls –List folders/files( check what ls -1 do). top — To monitor system activities. lsof –To check whats happening on the server and which process open which file.. netstat-tcp –Gives you complete DOCKER ENGINE EXPLAINED Introduction. In our last post, we explained how docker works on a client-server architecture and also talked about the different docker components.In this article, we will discuss the docker engine itself in greater detail. The docker engine is the heart of what runs andmanages containers.
4 COMMANDS YOU SHOULD KNOW TO COMPRESS FILES IN LINUX A common task on most modern operating systems is to combine and compress multiple files into a single file. This could be in order to store files on a smaller device, to make it easy to download files from a website, or to merge and compress files for email transport. This guide focuses on some HOW TO ENABLE VERBOSE MODE FOR SSH LOGINS? How we can login to remote server through ssh? #ssh user@servername or #ssh -l user servername or #ssh ip-add So when you will execute the above command you will get the password prompt. But if you want to see what will happen when you execute ssh command you have to enable verbose or debugging mode. CONTAINERIZATION AND ORCHESTRATION CONCEPTS EXPLAINED Introduction Containerization and orchestration technologies have immensely contributed to the revolution of mainstream IT and continue to play a pivotal role in the rise of DevOps culture across organizations. Before we started working with containers it’s important to understand what they are and how they work before diving deep into the implementation part of the EMBEDDING EXCEL/CSV FILE IN EMAIL FROM LINUX CLI Recently I was working with something and got into a situation where I wanted to embed some content to an email body and trigger it from a Linux server via command line inputs. We can do it using any of the Email-Clients until the file is an Excel(CSV) format and needed tosend it as an
GIT: HOW TO SET OR CHANGE DEFAULT EDITOR? Example: I want to set vim as my default editor to do that follow below command. git config --global core.editor vim. change default GIT editor by editing ~/.gitconfig. Enter below entry in to the file under section. editor = vim. Check if your editor is updated or not with following commands. git config core.editor. 7 INTERVIEW QUESTIONS FOR INFRASTRUCTURE OPERATIONAL Below are some of the typical interview questions you will come across when you apply for an infrastructure operational/Devops manager job. We are providing answers as a reference and these no need to be correct in your situation. They will just aid on how you can approach these type of questions. We usually do not SHELL SCRIPT TO CREATE AND CHANGE THE DIRECTORY Mr Surendra Anne is from Vijayawada, Andhra Pradesh, India. He is a Linux/Open source supporter who believes in Hard work, A down to earth person, Likes to share knowledge with others, Loves dogs, Likesphotography.
CONTAINERIZATION AND ORCHESTRATION CONCEPTS EXPLAINED Introduction Containerization and orchestration technologies have immensely contributed to the revolution of mainstream IT and continue to play a pivotal role in the rise of DevOps culture across organizations. Before we started working with containers it’s important to understand what they are and how they work before diving deep into the implementation part of the BASIC LINUX COMMANDS INTERVIEW QUESTIONS 1)Give me 15 commands which you use frequently. Depends on the environment you work. Some examples are. mkdir — For creating folders( use -p option to create multiple folders at a time) ls –List folders/files( check what ls -1 do). top — To monitor system activities. lsof –To check whats happening on the server and which process open which file.. netstat-tcp –Gives you complete DOCKER ENGINE EXPLAINED Introduction. In our last post, we explained how docker works on a client-server architecture and also talked about the different docker components.In this article, we will discuss the docker engine itself in greater detail. The docker engine is the heart of what runs andmanages containers.
5 LINUX ALIAS COMMAND EXAMPLES Let us start learning Linux alias command with examples. Example1: Create an alias for getting memory states on the machine. Alias RAM=’free -m’. Output: $ alias RAM='free -m'. linuxnix@ssh01 ~]$ RAM. total used free shared buffers cached Mem: 15936 521 15414 0 137 157 -/+ buffers/cache: 225 15710 Swap: 8039 08039
DOCKER: HOW TO START EXITED CONTAINER Method 1: Start and attache exited docker container. Once you get your container ID from the above command list, you can use whatever container ID you want to start with the following command. Example: I want to start “ 6ac657c2e560″, use below command for that. If you want to attach to this started container, you can execute attachcommand.
SHELL SCRIPT TO CREATE AND CHANGE THE DIRECTORY Mr Surendra Anne is from Vijayawada, Andhra Pradesh, India. He is a Linux/Open source supporter who believes in Hard work, A down to earth person, Likes to share knowledge with others, Loves dogs, Likesphotography.
HOW TO CHECK A SERVICE IS RUNNING OR NOT IN LINUX? The w is an excellent command which will give you a quick overview of 1) Users logged in. 2) What they are doing. 3) CPU stats. w command is similar to who command with bit of variation. The who command will not give information about what application/command an user is RESOLVING YUM: REPODATA IS OVER 2 WEEKS OLD. INSTALL YUM Introduction We’ve explored the yum package manager for RHEL based systems extensively in previous yum. In this article, we will present the cause and fix for the message “Repodata is over 2 weeks old. Install yum-cron? Or run: yum makecache fast” which you might occassionally come across while running yum commands. Cause of the ANISBLE: ERROR! UNEXPECTED PARAMETER TYPE IN ACTION: FIX Lately I am working on automating my website creation so that if I want to change my hosting provider. The other thought is to host my site locally on my kubernetes cluster which I am planing to implement in my home. I created an Ansible playbook to automate my WordPress website installation as 5 DIFFERENT WAYS TO DISPLAY IP ADDRESSES IN CENTOS 7 In this article, we will look at five different ways by which we can display the IP address information about our server. For the purpose of this demonstration, we will be working on a Centos 7 system. Method 1: Using ifconfig command. The ifconfig command is the most commonly used command for displaying and modifying IP addresses on the system.TRENDING:
What is a sticky Bit and how to set it in Linux? What is SUID and how to set SUID in Linux/Unix? Linux TOP command explained* Contact Us
* Testimonials
* Advertise
* About US
* Contribute
* Editorial team
* Support us
* Advertise
*
*
*
* Administration
* Monitoring
* Security
* Servers
* Basics
* Cloud
* AWS
* KVM
* Devops
* Ansible
* Docker
* Packer
* Puppet
* Vagrant
* Interviews
* News
* Offers
* Programming
* Awk
* Bash
* Batch
* Git
* Perl
* PowerShell
* python
* Ruby
* Sed
* SQL
* Reviews
* Books
* Linux/Unix
* Open source
Select Page
*
*
*
* Administration
* Monitoring
* Security
* Servers
* Basics
* Cloud
* AWS
* KVM
* Devops
* Ansible
* Docker
* Packer
* Puppet
* Vagrant
* Interviews
* News
* Offers
* Programming
* Awk
* Bash
* Batch
* Git
* Perl
* PowerShell
* python
* Ruby
* Sed
* SQL
* Reviews
* Books
* Linux/Unix
* Open source
* Contact Us
* Testimonials
* Advertise
* About US
* Contribute
* Editorial team
* Support us
* Advertise
ALL
Latest
SETTING UP CHROOTED SSH JAILS IN LINUX by Sahil Suri | Oct 8, 2019 | Administration, Basics
| 0
|
Introduction In one of our previous articles we demonstrated how to configure chrooted sftp user accounts. Along with the configuration of chrooted sftp accounts you can actually configure a mechanism for chrooted ssh access as...*
HOW TO EXCLUDE COPYING OF SPECIFIC DIRECTORIES IN LINUX USINGCP/SCP/RSYNC
by Sahil Suri | Oct 7, 2019 | Administration, Basics
| 0
|
*
DOCKER CONTAINER PORTS EXPLAINED by Sahil Suri | Sep 27,2019 | Basics | 0
|
AWK
Latest
AWK: PRINT HEADER LINE AND PATTERN MATCH by Sahil Suri | Oct 25,2017 | Awk | 0
|
AWK is a powerful regular expression filtering and pattern matching scripting language. Please consider heading to awk tutorials section to read through our other awesome AWK tutorials which deep dive into different aspects of...*
AWK SCRIPTING: LEARN AWK BUILT-IN VARIABLES WITH EXAMPLES by Surendra Anne | Apr 24,2013 | Awk | 0
|
*
AWK SCRIPTING: HOW TO DEFINE AWK VARIABLES by Surendra Anne | Apr 24,2013 | Awk | 1
|
BASICS
Latest
SETTING UP CHROOTED SSH JAILS IN LINUX by Sahil Suri | Oct 8, 2019 | Administration, Basics
| 0
|
Introduction In one of our previous articles we demonstrated how to configure chrooted sftp user accounts. Along with the configuration of chrooted sftp accounts you can actually configure a mechanism for chrooted ssh access as...*
HOW TO EXCLUDE COPYING OF SPECIFIC DIRECTORIES IN LINUX USINGCP/SCP/RSYNC
by Sahil Suri | Oct 7, 2019 | Administration, Basics
| 0
|
*
DOCKER CONTAINER PORTS EXPLAINED by Sahil Suri | Sep 27,2019 | Basics | 0
|
CLOUD/VIRTULIZATION
Latest
HOW TO USE CLOUD COMPUTING AND CREATE YOUR OWN INFRASTRUCTURE IN AWS? by Ankesh K | Dec 17, 2018 |Basics ,
Cloud/Virtulization
| 0
|
Welcome to linuxnix.com. In our last blog, we have learned about Cloud Computing and its characteristics. In this blog, we will go through the working of Cloud Computing, How to choose a cloud provider and How to create your...*
WHAT IS CLOUD COMPUTING AND ITS BENEFITS? by Ankesh K | Nov 29, 2018 |Cloud/Virtulization
, Devops
| 0
|
*
HOW TO INSTALL TERRAFORM AND CREATE YOUR FIRST INFRASTRUCTURE IN AWS? by Ankesh K | Nov 14, 2018 |Basics ,
Cloud/Virtulization
, Devops
| 0
|
GIT
Latest
GITHUB AND GIT INTEGRATION: USING SSH INSTEAD OF HTTPS by Sahil Suri | Aug 14,2018 | Git | 0
|
Introduction In our last article, we demonstrated how we could mirror our repository from our local computer to GitHub and use https to push our repository data from our local computer to GitHub. In thisarticle, we will...
*
GITHUB AND GIT INTEGRATION by Sahil Suri | Jul 19,2018 | Git | 0
|
*
USING .GITIGNORE TO PREVENT FILES FROM BEING TRACKED by Sahil Suri | Jun 26,2018 | Git | 0
|
LINUX/UNIX
Latest
REVIEW: CLOUDBERRY BACKUP FOR LINUX/UNIX by Surendra Anne | Sep 18,2017 | Linux/Unix ,
Open Source ,
Reviews | 0
|
Cloud backup software functions very much like conventional backup software. The fundamental difference with a cloud backup is that your data transmits over the Internet to be securely stored in a professional data center....OFFERS
Latest
FREE: JOIN OUR DEVOPS WHATSAPP/TELEGRAM GROUP(S) by Surendra Anne | Mar 17,2017 | Ansible ,
AWS ,
Cloud/Virtulization
, Devops
, Docker
, News
, Offers
, Packer
, Puppet
,
vagrant | 0
|
Hello to all from Linux Juggernaut team. We are excited to introduce our multiple WhatsApp groups...*
GET A CHEAP 1GB CLOUD SERVER FOR $4 by Surendra Anne | Feb 25,2016 | Offers | 0
|
PERL
Latest
PERL: DIFFERENCE BETWEEN CHOP AND CHOMP FUNCTIONS EXPLAINED by Surendra Anne | Apr 24,2013 | Perl | 1
|
This is our first post on Perl programming language. These two functions are useful in removing the last character of a given string, array(each element last character), hashes etc. Before going into detail, we will see why we...*
SHELL SCRIPT TO CONVERT BINARY TO DECIMAL NUMBER by Surendra Anne | Dec 19,2012 | Perl | 0
|
PUPPET
Latest
FREE: JOIN OUR DEVOPS WHATSAPP/TELEGRAM GROUP(S) by Surendra Anne | Mar 17,2017 | Ansible ,
AWS ,
Cloud/Virtulization
, Devops
, Docker
, News
, Offers
, Packer
, Puppet
,
vagrant | 0
|
Hello to all from Linux Juggernaut team. We are excited to introduce our multiple WhatsApp groups...*
PUPPET VS ANSIBLE VS DOCKER COMPARISON by Surendra Anne | Nov 8,2016 | Ansible ,
Devops , Docker
, Puppet
| 0
|
*
PUPPET: HOW TO INSTALL A PACKAGE/SOFTWARE by Surendra Anne | Oct 16, 2016 | Devops , Puppet| 0
|
RUBY
Latest
6 RUBY SUBSTRINGS EXAMPLES by Surendra Anne | Sep 29,2017 | Ruby
| 0
|
The substring is a part of string/variable. We can create substrings from a ruby string variable. We already dealt with substrings in Shell scripting in our early post. This substring can be one character length or multiple...SQL
Latest
MYSQL: HOW TO FIND TABLE AND DATABASE SIZE? by ZIADI Mohamed Ali | Jan 9,2017 | Basics , SQL
| 0
|
Sometimes you need to know the size of each mysql table to optimize them and gain some free space in the disk. To do so, you can check manually the size of each table in the mysql datadir (generally it is /var/lib/mysql), or you...*
HOW TO SORT SQL TABLE BY COLUMN? by Surendra Anne | Jan 5,2015 | SQL | 0
|
*
HOW TO INSTALL ORACLE ON RHEL5? by Surendra Anne | Mar 11, 2010 | Administration, Servers
, SQL
| 3
|
ADMINISTRATION
Latest
SETTING UP CHROOTED SSH JAILS IN LINUX by Sahil Suri | Oct 8, 2019 | Administration, Basics
| 0
|
Introduction In one of our previous articles we demonstrated how to configure chrooted sftp user accounts. Along with the configuration of chrooted sftp accounts you can actually configure a mechanism for chrooted ssh access as...*
HOW TO EXCLUDE COPYING OF SPECIFIC DIRECTORIES IN LINUX USINGCP/SCP/RSYNC
by Sahil Suri | Oct 7, 2019 | Administration, Basics
| 0
|
*
ANSIBLE INSTALL ON RHEL 8 EXPLAINED by Sahil Suri | Aug 22, 2019 | Administration, Ansible
, Devops
| 0
|
AWS
Latest
AWS GLOBAL REACH YOU SHOULD KNOWby author_kanika |
Sep 28, 2017 | AWS
| 0
|
AWS Global Reach Now the question comes to our minds are where are the data centers of AWS which are shared with us? How we use them? From where does AWS operates? Where is our data going? Let’s answer all these questions one by...*
FREE: JOIN OUR DEVOPS WHATSAPP/TELEGRAM GROUP(S) by Surendra Anne | Mar 17,2017 | Ansible ,
AWS ,
Cloud/Virtulization
, Devops
, Docker
, News
, Offers
, Packer
, Puppet
,
vagrant | 0
|
*
AMAZON AWS REGIONS VS AVAILABILITY ZONES VS EDGE LOCATIONS VS DATACENTERS
by Surendra Anne | Dec 1,2014 | AWS
| 2
|
BATCH
Latest
BATCH PROGRAMMING (DOS SCRIPTING) VS SHELL SCRIPTING by Surendra Anne | Jan 28, 2010 | Administration, Batch
| 3
|
When I started my career in IT field, I have landed into windows world, as I know that no...DEVOPS
Latest
DOCKER VOLUMES EXPLAINED by Sahil Suri | Sep 25, 2019 | Devops , Docker| 0
|
Introduction In earlier posts, we created a script in our container and we were able to execute it. But when the container is removed the script will get removed right along with it. What if we wanted the files created during...*
DOCKER NETWORKING COMMANDS EXPLAINED by Sahil Suri | Sep 24, 2019 | Devops , Docker| 0
|
*
DOCKER NETWORKING BASICS EXPLAINED by Sahil Suri | Sep 20, 2019 | Devops , Docker| 0
|
INTERVIEWS
Latest
7 INTERVIEW QUESTIONS FOR INFRASTRUCTURE OPERATIONAL MANAGER by Surendra Anne | Feb 25, 2017 | Interviews |0
|
Below are some of the typical interview questions you will come across when you apply for an...*
BASIC LINUX COMMANDS INTERVIEW QUESTIONS by Surendra Anne | Aug 18, 2011 | Interviews |7
|
*
IMPORTANT PORT NUMBERS FOR THE LINUX SYSTEM ADMINISTRATOR by Surendra Anne | May 19, 2011 | Interviews |26
|
MONITORING
Latest
HOW TO SETUP MRTG TO MONITOR NETWORK TRAFFIC ON A CENTOS 6 SYSTEM by Sahil Suri | Aug 1, 2018 | Administration, Basics
, Monitoring
| 0
|
Introduction There is a plethora of open source monitoring tools available in today. Some of these tools monitor a wide variety of metrics while some others have the capability to monitor a particular set of metrics really well....*
SSH – HOW TO ACCESS A REMOTE LINUX SERVER by Joginder | Feb 15, 2016 | Administration, Monitoring
,
Servers |
0
|
*
FIND SOUND CARD DETAILS IN LINUX/UNIX by Surendra Anne | Jun 9, 2013 | Administration, Monitoring
| 10
|
OPEN SOURCE
Latest
HOW TO SETUP PROMETHEUS MONITORING TOOL ON LINUX CENTOS 7 by Sahil Suri | Nov 16,2017 | Open Source
| 0
|
What is Prometheus? Prometheus is an open source monitoring tool which was developed in 2012. Its architecture is modular and comes with several readily available modules called exporters, which help you capture metrics from...*
REVIEW: CLOUDBERRY BACKUP FOR LINUX/UNIX by Surendra Anne | Sep 18,2017 | Linux/Unix ,
Open Source ,
Reviews | 0
|
POWER-SHELL
Latest
SORRY, NO POSTS FOUNDPYTHON
Latest
PFOTD: PYTHON CMP() BUILTIN FUNCTION EXAMPLES by Surendra Anne | Feb 28,2017 | python
| 0
|
This is one of our post in the “Python function of the day” series which explains about python inbuilt functions. Today we will learn about cmp(). cmp() : The method cmp() compares two datatypes. The data types supported are...*
HOW TO USE ALL() AND ANY() BUILT-INS IN PYTHON by manishel | Nov 15, 2016 |Basics , python
| 0
|
*
5 USEFUL VALUE UNPACKING AND * (STAR) OPERATOR IDIOMS IN PYTHON by manishel | Nov 11, 2016 |python | 0
|
SECURITY
Latest
WHAT ARE MELTDOWN AND SPECTRE VULNERABILITIES AND HOW PATCH THEM INRHEL/CENTOS
by Sahil Suri | Jan 10, 2018 | Administration, Security
| 0
|
Introduction Recently researchers at Google’s Project Zero have discovered two major vulnerabilities impacting almost all the processors made in the last 20 years. These vulnerabilities have been named Meltdown and Spectre. In...*
HOW TO READ OR VIEW UTMP, WTMP AND BTMP FILES IN LINUX/UNIX by Surendra Anne | Oct 10,2012 | Security
| 8
|
*
HOW TO GENERATE GPG KEY IN LINUX? by Surendra Anne | Oct 9,2012 | Security
| 2
|
ALL
Latest
SETTING UP CHROOTED SSH JAILS IN LINUX Introduction In one of our previous articles we demonstrated how to configure chrooted sftp user accounts. Along with the configuration of chrooted sftp accounts you can actually configure a mechanism for chrooted ssh access as...*
HOW TO EXCLUDE COPYING OF SPECIFIC DIRECTORIES IN LINUX USINGCP/SCP/RSYNC
*
DOCKER CONTAINER PORTS EXPLAINED*
DOCKER VOLUMES EXPLAINED*
DOCKER NETWORKING COMMANDS EXPLAINEDANSIBLE
Latest
ANSIBLE: INSERT A LINE AFTER A STRING USING LINEINFILE MODULE by Sahil Suri | Sep 17,2019 | Ansible ,
Devops | 0
|
Introduction I recently came across a situation wherein I needed to search for a string/word in a file and then append some piece of text after the matched string. I’m sure that there are many ways to accomplish this using...*
ANSIBLE INSTALL ON RHEL 8 EXPLAINED by Sahil Suri | Aug 22, 2019 | Administration, Ansible
, Devops
| 0
|
*
USING ANSIBLE-DOC FOR ACCESSING INBUILT DOCUMENTATION ON ANSIBLEMODULES
by Sahil Suri | Apr 4,2018 | Ansible ,
Devops | 0
|
BASH
Latest
HERE DOCUMENTS IN BASH EXPLAINED by Sahil Suri | Jul 22,2019 | Bash ,
Basics | 0
|
Introduction Input/output redirection is an extremely important aspect of writing bash shell scripts and working with the bash shell command line interface in general. A here document is a form of I/O redirection that tells the...*
USING SHELLCHECK TO WRITE BETTER SHELL SCRIPTS by Sahil Suri | Aug 6,2018 | Bash ,
Basics | 0
|
*
SHELL SCRIPTING: WATCH COMMAND ALTERNATIVE VIA WHILE LOOP by Sahil Suri | Jul 3, 2018 | Administration, Bash
, Basics
| 0
|
BOOKS
Latest
SORRY, NO POSTS FOUNDDOCKER
Latest
DOCKER VOLUMES EXPLAINED by Sahil Suri | Sep 25, 2019 | Devops , Docker| 0
|
Introduction In earlier posts, we created a script in our container and we were able to execute it. But when the container is removed the script will get removed right along with it. What if we wanted the files created during...*
DOCKER NETWORKING COMMANDS EXPLAINED by Sahil Suri | Sep 24, 2019 | Devops , Docker| 0
|
*
DOCKER NETWORKING BASICS EXPLAINED by Sahil Suri | Sep 20, 2019 | Devops , Docker| 0
|
KVM
Latest
KVM: GET HYPERVISOR AND GUEST VIRTUAL MACHINE DETAILS? by Surendra Anne | Feb 28,2013 | KVM
| 0
|
Managing KVM hypervisor and Virtual machines hosted by it are very much easy if you know what they are capable of. In this post we will see how to view different settings, Hardware info etc for both KVM hypervisor and Guest...*
KVM: START/STOP/SAVE/RESTART GUEST VM’S IN HYPERVISOR? by Surendra Anne | Feb 27,2013 | KVM
| 0
|
*
KVM: CONNECT TO A VIRTUAL MACHINE(SSH, VNC, CONSOLE, VIRT-VIEWER ETC) by Surendra Anne | Feb 25,2013 | KVM
| 0
|
NEWS
Latest
30 DEVOPS MUST HAVE MIND MAPS PROJECT BY LINUXNIX.COM by Surendra Anne | Aug 30,2017 | News | 0
|
As most of the people know DevOps is all about how many tools you master. For example take...*
FREE GIT ONLINE TRAINING FROM LINUXNIX.COM by Surendra Anne | Aug 18,2017 | News | 0
|
*
FREE: JOIN OUR DEVOPS WHATSAPP/TELEGRAM GROUP(S) by Surendra Anne | Mar 17,2017 | Ansible ,
AWS ,
Cloud/Virtulization
, Devops
, Docker
, News
, Offers
, Packer
, Puppet
,
vagrant | 0
|
PACKER
Latest
FREE: JOIN OUR DEVOPS WHATSAPP/TELEGRAM GROUP(S) by Surendra Anne | Mar 17,2017 | Ansible ,
AWS ,
Cloud/Virtulization
, Devops
, Docker
, News
, Offers
, Packer
, Puppet
,
vagrant | 0
|
Hello to all from Linux Juggernaut team. We are excited to introduce our multiple WhatsApp groups...PROGRAMMING
Latest
HERE DOCUMENTS IN BASH EXPLAINED by Sahil Suri | Jul 22,2019 | Bash ,
Basics | 0
|
Introduction Input/output redirection is an extremely important aspect of writing bash shell scripts and working with the bash shell command line interface in general. A here document is a form of I/O redirection that tells the...*
EMBEDDING EXCEL/CSV FILE IN EMAIL FROM LINUX CLI by Ankesh K | Aug 22, 2018 |Administration ,
Basics , Programming| 0
|
*
GITHUB AND GIT INTEGRATION: USING SSH INSTEAD OF HTTPS by Sahil Suri | Aug 14,2018 | Git | 0
|
REVIEWS
Latest
HOW TO SETUP PROMETHEUS MONITORING TOOL ON LINUX CENTOS 7 by Sahil Suri | Nov 16,2017 | Open Source
| 0
|
What is Prometheus? Prometheus is an open source monitoring tool which was developed in 2012. Its architecture is modular and comes with several readily available modules called exporters, which help you capture metrics from...*
REVIEW: CLOUDBERRY BACKUP FOR LINUX/UNIX by Surendra Anne | Sep 18,2017 | Linux/Unix ,
Open Source ,
Reviews | 0
|
SERVERS
Latest
HOW TO INSTALL AND MOUNT XTREEMFS IN LINUX by ZIADI Mohamed Ali | Nov 12, 2016 | Administration, Servers
| 0
|
What is XtreemFS? XtreemFS is a fault-tolerant distributed file system adapted for different storage needs. It is characterized by it’s: Versatility : XtreemFS is an open-source technology that do not require special hardware of...*
REDIS : INSTALLATION, CONFIGURATION AND REPLICATION IN LINUX by ZIADI Mohamed Ali | Nov 11, 2016 | Administration, Servers
| 0
|
*
MEMCACHED (PART – II) : HOW TO TEST, TROUBLESHOOT AND VIEW STATS by ZIADI Mohamed Ali | Nov 9, 2016 | Administration, Servers
| 0
|
SHOP
We are dedicated people who require your support either throughdonations
LINUX SUPPORT
We are dedicated people who require your support either throughdonations
TRAINING
We are dedicated people who require your support either throughdonations
OVER 16,000 READERS, GET FRESH CONTENT FROM “THE LINUX JUGGERNAUT”* __
* __
* __
* __
* __
EMAIL SUBSCRIBE
TAKE THIS COURSE
Essentials of OpenStack Administration (LFS252)Search for:
ABOUT ME..!
My name is Surendra Kumar Anne. I hail from Vijayawada which is cultural capital of south Indian state of Andhra Pradesh. I am a Linux evangelist who believes in Hard work, A down to earth person, Likes to share knowledge with others, Loves dogs, Likes photography. At present I work at Bank of America as Sr. Analyst Systems and Administration. You can contact me at surendra (@) linuxnix dot com.* Contact Us
* Testimonials
* Advertise
* About US
* Contribute
* Editorial team
* Support us
* Advertise
*
*
*
×
Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0