Quantcast
Channel: LHB Community - Linux Handbook
Browsing all 174 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

10 Useful Examples of the Sort Command in Linux

Sort command in Linux is used for sorting the contents of the text files. This tutorial shows you some basic examples of the sort command. Sort command in Linux The sort command arranges text lines in...

View Article


Image may be NSFW.
Clik here to view.

9 Useful Examples of the Split Command in Linux

The split command in Linux allows you to split files into multiple files. There are several ways you can customize parameters for your given application. I’ll show you some examples of the split...

View Article


Image may be NSFW.
Clik here to view.

5 Practical Examples of the Read Command in Linux

With read command, you can make your bash script interactive by accepting user inputs. Learn to use the read command in Linux with these practical examples. What is the read command in Linux? The read...

View Article

Image may be NSFW.
Clik here to view.

Using Diff Command to Compare Two Files in Linux Terminal

When you need to compare two files containing similar text in Linux, using the diff command can make your task much easier. The command compares two files to suggest changes that would make the files...

View Article

Image may be NSFW.
Clik here to view.

Uniq Command in Linux Explained With Examples

Learn to use the uniq command in Unix and Linux with these practical examples. The uniq command in Unix and Linux is used for filtering duplicate text. It can be used by itself but it is commonly used...

View Article


Image may be NSFW.
Clik here to view.

Check Linux Server Vulnerabilities with OpenVAS

Everyday, new vulnerabilities are “born” in the digital world. System admins are often busy in managing the servers and they overlook obvious security issues. Scanning a Linux server for security...

View Article

Image may be NSFW.
Clik here to view.

Understanding Crontab in Linux With Examples

The crontab is used to automate all types of tasks on Linux systems. This is an especially important skill for aspiring system administrators to learn. It can be somewhat challenging to get started if...

View Article

Image may be NSFW.
Clik here to view.

iptables vs nftables: What's the Difference?

Every Linux administrator has surely worked with iptables, the longstanding Linux firewall that has served us well for many years. But you may not yet be familiar with nftables, a newcomer meant to...

View Article


Image may be NSFW.
Clik here to view.

How to Use Jobs Command in Linux

The jobs command in Linux allows the user to directly interact with processes in the current shell.Jobs have three possible states in Linux: foreground, background, and stopped.What does that mean?...

View Article


Image may be NSFW.
Clik here to view.

How to Install and Configure Grafana

Grafana is one of the most famous open source tools for monitoring and get information from several data sources. It’s well known for its beautiful and clean dashboards, where it can be easily set and...

View Article

Image may be NSFW.
Clik here to view.

Install and Configure Webmin to Manage Linux Servers Remotely and Graphically

Webmin is an open-source web-based control panel for system administration primarily for Unix-like systems.Being a sysadmin means that you should have a good knowledge of Linux commands. But not...

View Article

Image may be NSFW.
Clik here to view.

Getting Started with Tmux [Beginner's Guide]

With tmux, you can create multiple terminal sessions that can be opened (attached) and closed (detached) or displayed simultaneously all from one window. Multiple panes using tmux Learning how to use...

View Article

Image may be NSFW.
Clik here to view.

Setup Visual Monitoring of InfluxDB Time Series Data in Grafana

In an earlier article about monitoring, I described how install and configure Grafana. In this tutorial, I’ll show you how to install and use one of the most famous open source time series databases...

View Article


Image may be NSFW.
Clik here to view.

Special File Permissions in Linux: SUID, GUID and Sticky Bit

File permissions and ownership are the basic and yet essential security concept in Linux. You probably are already familiar with these terms already. It typically looks like this:Regular file...

View Article

Image may be NSFW.
Clik here to view.

How to Use More Command in Linux to Read Large Text Files

There are various ways to view text files in Linux terminal.When you are new to Linux, you try to use the cat command all the time to read the content of a file. This works great for files with only a...

View Article


Image may be NSFW.
Clik here to view.

How to Install Ansible on Ubuntu and Other Linux Distributions

These days, Ansible is a big buzzword in the IT industry. It is a radical automation DevOps tool for IT orchestration. Ansible is an open-source tool by Red Hat. It helps to configure, provision,...

View Article

Image may be NSFW.
Clik here to view.

10 Practical Examples of Using scp Command

Here are some practical and essential scp command example to show how to securely copy files between remote Linux systems. You are probably already familiar with the cp command in Linux which is used...

View Article


Image may be NSFW.
Clik here to view.

5 Practical Examples of Head Command in Linux

In this article, you will learn some essential examples of the head command in Linux. You may know that the cat command is used to print the contents of a file, onto the terminal. The cat command...

View Article

Image may be NSFW.
Clik here to view.

Getting Started With Buildah

“Docker,  Docker, Docker” that is what we used until recently. Docker is still very popular, no doubt. But as we know in the IT industry, evolution happens rapidly. So now we will hear Buildah,...

View Article

Image may be NSFW.
Clik here to view.

Configuring Graylog Server to Manage Logs on Linux

Have you ever wondered about managing big amount of logs? At some point everyone sysadmin has, I believe. The solution is very simple: ‘Configure a Graylog Server.’ In the previous tutorial, I showed...

View Article
Browsing all 174 articles
Browse latest View live