Showing headlines posted by linuxer
« Previous ( 1 2 3 4 5 6 7 8 9 ... 32 ) Next »How to Remove All Files and Directories Owned by a Specific User or Group on Linux
Removing all files and directories owned by a specific user or group on a Linux system can be crucial for maintaining system integrity and ensuring proper management of user data. Whether you need to clean up resources after removing a user, enforce security policies, or simply free up disk space, understanding the steps to perform this task efficiently and safely is important.
How to list all VirtualBox available virtual machines from command line
In this article, we will explore various methods to list all available virtual machines (VMs) in VirtualBox using the command line. This will include techniques to list running, stopped, suspended VMs, their states, disk sizes, and more. Command line management of VMs is a powerful way to automate and streamline your virtualization tasks, especially for system administrators and power users.
How to reset MySQL root password on your Linux server
Resetting the MySQL root password on a Linux server can be a critical task when access to the MySQL server is lost or when setting up a new server. This process involves several steps, including stopping the MySQL service, starting MySQL in a safe mode, and updating the root password. This guide will walk you through each step in detail to ensure you can reset your MySQL root password successfully.
How to List Filesystem Partition Type Codes in Linux
Understanding the filesystem partition type codes on a Linux system is crucial for managing disks and partitions effectively. These codes help identify the type of filesystem and the partitions’ role within the system. This guide will walk you through the steps to list these partition type codes using various command-line tools in Linux.
How to Remove Unused Packages on CentOS Linux
Removing unused or orphaned packages from your CentOS Linux system can help free up disk space, improve system performance, and reduce potential security vulnerabilities. Orphaned packages are those that were installed as dependencies for other software but are no longer needed because the original software has been removed. This guide will walk you through the steps to identify and remove these orphaned packages effectively.
Setting Up Nginx Reverse Proxy Server on Ubuntu/Debian
A reverse proxy server is a type of server that sits in front of web servers and forwards client (e.g., web browser) requests to those web servers. Reverse proxies are typically installed to increase security, performance, and reliability. This tutorial will guide you through the process of setting up Nginx, a high-performance and highly scalable web server, as a reverse proxy on a system running Ubuntu or Debian.
How to Find Writable Files and Directories in Linux
When managing a Linux system, ensuring the security and appropriate permissions of files and directories is crucial. Particularly, being aware of which files and directories have write permissions is important for system security and data integrity. This guide will show you how to use the find command to search recursively through the file system to identify files and directories based on their write permissions.
How to disable NGINX logging on Linux
Disabling logging in NGINX can be useful for various reasons, such as reducing disk usage, improving performance, or simply because you don’t need the logs for a particular application. This guide will walk you through the steps to disable access and error logging in NGINX on a Linux system.
How to Retrieve Docker Container’s Internal IP Address
Docker containers are an essential part of modern application deployment and development. Often, there is a need to know the internal IP address of a Docker container for debugging, networking, or integration purposes. This article will guide you through the steps to retrieve the internal IP address of a Docker container using different methods.
Bash Scripting: Understanding the Use of Parentheses, Brackets, and Braces
In this tutorial, we will explore the various uses of parentheses, brackets, and braces in BASH scripting. These symbols have distinct functionalities and are crucial for writing effective scripts. Understanding their uses can help you in tasks such as arithmetic operations, test constructs, and parameter expansions.
Using sed and Bash to Fill Empty Cells in a CSV File
Dealing with CSV files containing empty cells can be challenging, especially when trying to process or analyze data programmatically. In this article, we will explore how to use Bash and the powerful text stream editor sed to fill these empty cells efficiently. This approach ensures that your data is complete and ready for further manipulation or analysis.
Internal vs External Linux Shell Commands
Linux commands are an essential part of managing and operating Linux systems, providing users with the ability to perform a wide range of tasks from file manipulation to system monitoring. These commands can be categorized into two types: internal and external commands. Internal commands are built into the shell itself, enabling quick execution without the need for external binaries. In contrast, external commands are separate executable files located in the system’s file hierarchy.
How to Deny/Allow Access to Files Using .htaccess
The .htaccess file is a powerful configuration tool for web servers that use Apache. It allows you to control various aspects of your website, including security settings. One of the critical uses of the .htaccess file is to manage access to files and directories. This article will guide you through the process of using .htaccess to deny or allow access to files based on different criteria, such as IP address, user authentication, and file types.
How to Check a Website Header Using Linux Command Line
Checking the headers of a website can provide valuable information about the server, security policies, and other metadata. This is particularly useful for web developers, system administrators, and security professionals. The Linux command line offers several tools that allow users to inspect website headers easily and efficiently.
How to Disable User Accounts on a Linux System
Disabling user accounts on a Linux system is a common administrative task, often performed to prevent users from accessing the system without completely removing their accounts. This can be necessary for various reasons, such as security concerns, temporary suspensions, or transitioning users to different systems. This guide will walk you through the steps required to disable user accounts effectively and securely.
How to Create a File-Based Filesystem Using dd Command on Linux
Creating a file-based filesystem on Linux using the dd command is a useful technique for testing, development, or creating isolated storage environments without partitioning your physical disks. This tutorial will guide you through each step in detail, explaining the purpose and the commands involved.
How to Insert a Line at the Beginning of a File on Linux
In Linux, modifying files from the command line is a common task. Whether you need to prepend configuration parameters, add headers to text files, or make bulk edits, knowing how to insert a line at the beginning of a file can be very useful. This article explores several methods to achieve this efficiently.
SSH Tunnels: Secure Remote Access and Port Forwarding
SSH is a communication protocol that allows us to access remote hosts and securely transfer data over unsecure networks, thanks to encrypted connections. By using the SSH tunneling technique, we can forward TCP traffic from and to a local machine, bypassing firewall restrictions. In this tutorial, we learn the difference between local and remote SSH tunnels, and how to create them.
How to Clone Permissions from Another File or Directory on Linux
In this article, we will explore how to clone permissions from one file or directory to another on a Linux system. This is a common task that can save time and ensure consistency across your file system. By using a few simple commands, you can easily duplicate the permissions of any file or directory to another, maintaining the desired access control settings.
Self-Host Immich: Open Source Google Photos Alternative
Immich is a free and open source alternative to Google Photos, with a focus on privacy. Both the server software and the mobile client application, are developed in the open on GitHub. Thanks to the container technology, deploying a private, self-hosted instance of Immich is quite easy. In this tutorial, we learn how to run a self-hosted Immich instance using Docker, to manage and backup our photos and videos.