Lindevs
Programming tutorials, blogs & resources
Menu
  • Home ×
  • Tutorials
    • Programming Language
      • Python
      • PHP
      • Java
    • Machine Learning
      • TensorFlow 2
      • PyTorch
    • Computer Vision
      • OpenCV
    • Embedded System
      • Raspberry Pi
      • Arduino
      • ESP8266
      • XIAO SAMD21
    • Home Automation
      • Tasmota
    • Mobile App Development
      • Android
      • Flutter
    • Game Development
      • Unity
    • Framework
      • Laravel
      • Symfony
    • Operating System
      • Linux
        • Ubuntu
      • Windows
    • Database
      • MySQL
    • DevOps
      • Command Line
      • Web Server
      • Grafana
      • Networking
      • Security
      • Containerization
  • Code Snippets
  • Electronics
    • Circuits
  • Questions
    • PHP
  • Contact
    • Sign In

Monthly Archives: July 2022

5 Methods to Get Hostname in Linux

5 Methods to Get Hostname in Linux

  • July 31, 2022
  • Linux
  • 0 Comments
  • 318 Views
A hostname is a unique identifier that is assigned to a device (host) connected to the network. It allows to distinguish one device from another on a specific network. This...
Generate and Verify SHA-224 Hash of File in Linux

Generate and Verify SHA-224 Hash of File in Linux

  • July 30, 2022
  • Linux
  • 0 Comments
  • 195 Views
SHA-224 is a cryptographic hash function that can be used for verifying file integrity. For example, to check that the file has not been modified during transfer over the network...
Get Information About Command Using type Command in Linux

Get Information About Command Using type Command in Linux

  • July 29, 2022
  • Linux
  • 0 Comments
  • 212 Views
The type command allows to display information about the command type. It means whether a Linux command is alias to some other command, built-in shell command, etc. This tutorial shows...
Force User To Disconnect From SSH Connection in Linux

Force User To Disconnect From SSH Connection in Linux

  • July 28, 2022
  • Linux
  • 0 Comments
  • 191 Views
When working as system administrator in Linux, might need to forcefully disconnect user from SSH connection. One of the reasons to do that is when suspicious user is detected which...
Search Appropriate Commands Using apropos in Linux

Search Appropriate Commands Using apropos in Linux

  • July 27, 2022
  • Linux
  • 0 Comments
  • 208 Views
In Linux, there are many commands and can become quite difficult to remember names. In such case, the apropos command can be useful. It allows to search for commands by...
Print Text Using echo Command Without New Line in Linux

Print Text Using echo Command Without New Line in Linux

  • July 26, 2022
  • Linux
  • 0 Comments
  • 219 Views
The echo is a built-in Linux command for printing text in the terminal. By default, this command adds a new line character. In some cases, it can be undesirable result...
Measure Execution Time of Code using Raspberry Pi Pico

Measure Execution Time of Code using Raspberry Pi Pico

  • July 25, 2022
  • Raspberry Pi
  • 0 Comments
  • 2023 Views
Execution time of a code is amount of time spent by the system executing that code. Execution time is important when want to optimize a code. This tutorial shows how...
Generate and Verify SHA-512 Hash of File in Linux

Generate and Verify SHA-512 Hash of File in Linux

  • July 24, 2022
  • Linux
  • 0 Comments
  • 1946 Views
SHA-512 is a cryptographic hash function that can be used for verifying file integrity. For example, to check that the file has not been changed during transfer over the network...
Undo and Redo Changes using nano Text Editor in Linux

Undo and Redo Changes using nano Text Editor in Linux

  • July 23, 2022
  • Linux
  • 0 Comments
  • 252 Views
The nano is a text editor which pre-installed in many Linux distributions. When working with text files, we can accidentally make mistakes by pressing anything. In this case undo and...
Generate and Verify SHA-384 Hash of File in Linux

Generate and Verify SHA-384 Hash of File in Linux

  • July 22, 2022
  • Linux
  • 0 Comments
  • 405 Views
SHA-384 is a cryptographic hash function that can be used for file integrity verification. For example, to check that the file has not been altered during transfer over the network...
  • 1
  • 2
  • 3
  • 4
  • »
Buy Me a Coffee

Recent Posts

  • Install TubeSync Inside Docker Container in Linux
  • Count Lines of Source Code using cloc on Ubuntu 22.04
  • Install pyLoad Inside Docker Container in Linux
  • Install Podgrab Inside Docker Container in Linux
  • Install OliveTin Inside Docker Container in Linux

Archives

  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
Copyright © 2020 - 2023 · lindevs.com · All Rights Reserved