System reboot may be required when troubleshooting issues, applying configuration changes, finishing application installation. Reboot resets all processes, free up memory, remove temporary files, etc. This tutorial provides 2 methods...
There are many ways to view contents of a file. Files which content changes very rarely can be viewed using cat command. Log files are dynamic and their content changes...
A hostname is a unique identifier that is assigned to a device (host) connected to the network. It allows to distinguish one device from another on a specific network. This...
SHA-224 is a cryptographic hash function that can be used for verifying file integrity. For example, to check that the file has not been modified during transfer over the network...
The type command allows to display information about the command type. It means whether a Linux command is alias to some other command, built-in shell command, etc. This tutorial shows...
When working as system administrator in Linux, might need to forcefully disconnect user from SSH connection. One of the reasons to do that is when suspicious user is detected which...
In Linux, there are many commands and can become quite difficult to remember names. In such case, the apropos command can be useful. It allows to search for commands by...
The echo is a built-in Linux command for printing text in the terminal. By default, this command adds a new line character. In some cases, it can be undesirable result...
Execution time of a code is amount of time spent by the system executing that code. Execution time is important when want to optimize a code. This tutorial shows how...
SHA-512 is a cryptographic hash function that can be used for verifying file integrity. For example, to check that the file has not been changed during transfer over the network...