Lindevs
Programming tutorials, blogs & resources
Menu
  • Home ×
  • Tutorials
    • Programming Language
      • Python
      • PHP
      • Java
      • C
      • C++
      • JavaScript
    • Machine Learning
      • TensorFlow 2
      • PyTorch
    • Computer Vision
      • OpenCV
    • Embedded System
      • Raspberry Pi
      • Arduino
      • ESP8266
      • XIAO SAMD21
    • Home Automation
      • Tasmota
    • Mobile App Development
      • Android
      • Flutter
    • Game Development
      • Unity
    • Framework
      • Laravel
      • Symfony
    • Operating System
      • Linux
        • Ubuntu
      • Windows
    • Database
      • MySQL
    • DevOps
      • Command Line
      • Web Server
      • Grafana
      • Networking
      • Security
      • Containerization
  • Code Snippets
  • Electronics
    • Circuits
  • Questions
    • PHP
  • Contact
    • Sign In

Monthly Archives: July 2022

5 Methods to Get Hostname in Linux

5 Methods to Get Hostname in Linux

  • July 31, 2022
  • Linux
  • 0 Comments
  • 840 Views
A hostname is a unique identifier that is assigned to a device (host) connected to the network. It allows to distinguish one device from another on a specific network. This...
Generate and Verify SHA-224 Hash of File in Linux

Generate and Verify SHA-224 Hash of File in Linux

  • July 30, 2022
  • Linux
  • 0 Comments
  • 505 Views
SHA-224 is a cryptographic hash function that can be used for verifying file integrity. For example, to check that the file has not been modified during transfer over the network...
Get Information About Command Using type Command in Linux

Get Information About Command Using type Command in Linux

  • July 29, 2022
  • Linux
  • 0 Comments
  • 383 Views
The type command allows to display information about the command type. It means whether a Linux command is alias to some other command, built-in shell command, etc. This tutorial shows...
Force User To Disconnect From SSH Connection in Linux

Force User To Disconnect From SSH Connection in Linux

  • July 28, 2022
  • Linux
  • 0 Comments
  • 368 Views
When working as system administrator in Linux, might need to forcefully disconnect user from SSH connection. One of the reasons to do that is when suspicious user is detected which...
Search Appropriate Commands Using apropos in Linux

Search Appropriate Commands Using apropos in Linux

  • July 27, 2022
  • Linux
  • 0 Comments
  • 384 Views
In Linux, there are many commands and can become quite difficult to remember names. In such case, the apropos command can be useful. It allows to search for commands by...
Print Text Using echo Command Without New Line in Linux

Print Text Using echo Command Without New Line in Linux

  • July 26, 2022
  • Linux
  • 0 Comments
  • 447 Views
The echo is a built-in Linux command for printing text in the terminal. By default, this command adds a new line character. In some cases, it can be undesirable result...
Measure Execution Time of Code using Raspberry Pi Pico

Measure Execution Time of Code using Raspberry Pi Pico

  • July 25, 2022
  • Raspberry Pi
  • 0 Comments
  • 6018 Views
Execution time of a code is amount of time spent by the system executing that code. Execution time is important when want to optimize a code. This tutorial shows how...
Generate and Verify SHA-512 Hash of File in Linux

Generate and Verify SHA-512 Hash of File in Linux

  • July 24, 2022
  • Linux
  • 0 Comments
  • 7501 Views
SHA-512 is a cryptographic hash function that can be used for verifying file integrity. For example, to check that the file has not been changed during transfer over the network...
Undo and Redo Changes using nano Text Editor in Linux

Undo and Redo Changes using nano Text Editor in Linux

  • July 23, 2022
  • Linux
  • 0 Comments
  • 597 Views
The nano is a text editor which pre-installed in many Linux distributions. When working with text files, we can accidentally make mistakes by pressing anything. In this case undo and...
Generate and Verify SHA-384 Hash of File in Linux

Generate and Verify SHA-384 Hash of File in Linux

  • July 22, 2022
  • Linux
  • 0 Comments
  • 1783 Views
SHA-384 is a cryptographic hash function that can be used for file integrity verification. For example, to check that the file has not been altered during transfer over the network...
  • 1
  • 2
  • 3
  • 4
  • »
Buy Me a Coffee

Recent Posts

  • Generate C-Compatible Byte Array from File on Linux
  • Check Stack Usage Per Function using gcc or g++ Compiler
  • Generate Assembly Code using MSVC Compiler
  • Get MSVC Compiler Version Used to Compile C++ Code
  • Install NVIDIA Container Toolkit on Ubuntu 24.04

Archives

  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
Copyright © 2020 - 2025 · lindevs.com · All Rights Reserved