umask in Linux
File Permissions In Linux, each files has nine permission bits. There are three basic permissions, read (r), write (w) and execute (x), for a file. These three permissions are there…
File Permissions In Linux, each files has nine permission bits. There are three basic permissions, read (r), write (w) and execute (x), for a file. These three permissions are there…
1.0 INTRODUCTION The iproute2 package contains utilities for network and traffic control. The major commands in iproute2 package are the ip command for IPV4 and IPV6 configuration and tc for…
htop is a ncurses based program for viewing processes in a Linux system. htop gives visual indications about processor, memory and swap usage.
vimdiff works on two, three or four files, opens each file in a separate window and highlights the differences between the files. The files can be edited using the vim…
Git is a software source code management (SCM) system, originally developed by Linus Torvalds in 2005 for management of Linux kernel source code. Using Git greatly simplifies the source code…
1.0 iptables The iptables command is for defining rules for packet filtering for establishing and configuring firewalls in Linux. iptables, also, helps in configuring the Network Address Translation (NAT) for…
As we work on different computers at different times, it becomes increasingly difficult to keep track of file versions. For example, you might be working on a development of a…
1. netstat command The netstat command in Linux provides network statistics and information about the networking subsystem. It gives information about network connections, routing tables and network interface statistics. For…
In Internet, the Internet Protocol (IP) is at the Network Layer, which is the third layer of the ISO reference model of network architecture. IP deals with IP packets or…
Linux daemons write log files. Left to itself, these log files would grow with time and take up the disk space. It is necessary to purge the log files periodically…