A hostname is a unique identifier that is assigned to a device (host) connected to the network. It allows to distinguish one device from another on a specific network. This...
SHA-224 is a cryptographic hash function that can be used for verifying file integrity. For example, to check that the file has not been modified during transfer over the network...
The type command allows to display information about the command type. It means whether a Linux command is alias to some other command, built-in shell command, etc. This tutorial shows...
When working as system administrator in Linux, might need to forcefully disconnect user from SSH connection. One of the reasons to do that is when suspicious user is detected which...
In Linux, there are many commands and can become quite difficult to remember names. In such case, the apropos command can be useful. It allows to search for commands by...
The echo is a built-in Linux command for printing text in the terminal. By default, this command adds a new line character. In some cases, it can be undesirable result...
Execution time of a code is amount of time spent by the system executing that code. Execution time is important when want to optimize a code. This tutorial shows how...
SHA-512 is a cryptographic hash function that can be used for verifying file integrity. For example, to check that the file has not been changed during transfer over the network...
The nano is a text editor which pre-installed in many Linux distributions. When working with text files, we can accidentally make mistakes by pressing anything. In this case undo and...
SHA-384 is a cryptographic hash function that can be used for file integrity verification. For example, to check that the file has not been altered during transfer over the network...