When working on Windows operating system and manipulating files, may needed to remove empty lines from a file to make it easier to read or to be processed further. This...
A hostname is a unique identifier that is assigned to a device (host) which connected to the network. It allows to differentiate one device from another on a specific network...
Shell is a command line interpreter. There are various shells in Linux. The bash shell is integrated in many Linux distributions. There also are ksh, zsh, tcsh. This tutorial provides...
System reboot may be required when troubleshooting issues, applying configuration changes, finishing application installation. Reboot resets all processes, free up memory, remove temporary files, etc. This tutorial provides 2 methods...
There are many ways to view contents of a file. Files which content changes very rarely can be viewed using cat command. Log files are dynamic and their content changes...
A hostname is a unique identifier that is assigned to a device (host) connected to the network. It allows to distinguish one device from another on a specific network. This...
SHA-224 is a cryptographic hash function that can be used for verifying file integrity. For example, to check that the file has not been modified during transfer over the network...
The type command allows to display information about the command type. It means whether a Linux command is alias to some other command, built-in shell command, etc. This tutorial shows...
When working as system administrator in Linux, might need to forcefully disconnect user from SSH connection. One of the reasons to do that is when suspicious user is detected which...
In Linux, there are many commands and can become quite difficult to remember names. In such case, the apropos command can be useful. It allows to search for commands by...