サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
都知事選
www.thegeekstuff.com
7 Linux Grep OR, Grep AND, Grep NOT Operator Examples Question: Can you explain how to use OR, AND and NOT operators in Unix grep command with some examples? Answer: In grep, we have options equivalent to OR and NOT operators. There is no grep AND opearator. But, you can simulate AND using patterns. The examples mentioned below will help you to understand how to use OR, AND and NOT in Linux grep c
To get to the Menu on Google Chrome browser, click on the “Wrench” icon on the top right-hand corner. From here you can access certain browser features. However, there are several features that are not available from the Menu, which you can access only using the chrome:// commands. Some of the features are available under both Menu and chrome:// commands. Following are the 12 most helpful chrome:/
Using Vim Macro feature you can record and play a sequence of actions inside the editor. This article explains how to perform record and play inside Vi and Vim editor using two detailed examples. High Level Steps to Record and Play inside Vim Start recording by pressing q, followed by a lower case character to name the macro Perform any typical editing, actions inside Vim editor, which will be rec
htop is just like top, but on steroids. Once you are used to htop, you’ll never go back to top again. htop is a ncurses-based process viewer. You can interact with the htop using mouse. You can scroll vertically to view the full process list, and scroll horizontally to view the full command line of the process. This article explains 15 essential htop command examples. Install Htop top command is a
In the previous post Nagios 3.0 Jumpstart guide , I explained the overview, installation and configuration of Nagios 3.0 on Red Hat Server. In the following three chapters, I’ll explain how to monitor a remote Linux host and the various services running on the remote host. Also, please refer to all our Nagios articles. I. Overview II. 6 steps to install Nagios plugin and NRPE on remote host. Down
Bash history is very powerful. Understanding how to effectively use the bash history expansions will make you extremely productive on the Linux command line. This article explains 15 examples that uses the following bash history expansion features: Event designators – Refers to a particular command in the history. It starts with a ! Word designators – Refers to a particular word of a history entry
If you spend lot of time in Linux environment, it is essential that you know where the log files are located, and what is contained in each and every log file. When your systems are running smoothly, take some time to learn and understand the content of various log files, which will help you when there is a crisis and you have to look though the log files to identify the issue. /etc/rsyslog.conf c
12 Reasons Why Every Linux System Administrator Should be Lazy Lazy sysadmin is the best sysadmin –Anonymous System administrators job is not visible to other IT groups or end-users. Mostly they look at administrators and wonder why sysadmins don’t seem to have any work. If you see a sysadmin who is always running around, and trying to put down fire, and constantly dealing with production issues,
At a first glance, IPTables rules might look cryptic. In this article, I’ve given 25 practical IPTables rules that you can copy/paste and use it for your needs. These examples will act as a basic templates for you to tweak these rules to suite your specific requirement. For easy reference, all these 25 iptables rules are in shell script format: iptables-rules 1. Delete Existing Rules Before you st
Top 7 Free SFTP or SCP Clients for Windows (Transfer Files to Linux) Most organizations run Linux servers for their enterprise databases and applications. However the developers and admins might have Windows laptops. In those cases, you might be using PuTTY (or related tools like PuttyCM) to ssh from Windows to Linux. You might also want to transfer files from Windows to Linux and vice versa. You
ext2, ext3 and ext4 are all filesystems created for Linux. This article explains the following: High level difference between these filesystems. How to create these filesystems. How to convert from one filesystem type to another. Ext2 stands for second extended file system. It was introduced in 1993. Developed by Rémy Card. This was developed to overcome the limitation of the original ext file sys
10 Useful Sar (Sysstat) Examples for UNIX / Linux Performance Monitoring Using sar you can monitor performance of various Linux subsystems (CPU, Memory, I/O..) in real time. Using sar, you can also collect all performance data on an on-going basis, store them, and do historical analysis to identify bottlenecks. Sar is part of the sysstat package. This article explains how to install and configure
If you are a sysadmin, you should secure your Apache web server by following the 10 tips mentioned in this article. 1. Disable unnecessary modules If you are planning to install apache from source, you should disable the following modules. If you do ./configure –help, you’ll see all available modules that you can disable/enable. userdir – Mapping of requests to user-specific directories. i.e ~user
This is the 1st article in our new series on Linux performance monitoring and tuning. Linux system administrators should be proficient in Linux performance monitoring and tuning. This article gives a high level overview on how we should approach performance monitoring and tuning in Linux, and the various subsystems (and performance metrics) that needs to be monitored. To identify system bottleneck
Bash Shell: Take Control of PS1, PS2, PS3, PS4 and PROMPT_COMMAND Your interaction with Linux Bash shell will become very pleasant, if you use PS1, PS2, PS3, PS4, and PROMPT_COMMAND effectively. PS stands for prompt statement. This article will give you a jumpstart on the Linux command prompt environment variables using simple examples. 1. PS1 – Default interaction prompt The default interactive p
9 UNIX / Linux tput Examples: Control Your Terminal Color and Cursor tput command is used to query the terminfo terminal database and check if that terminal supports a specific feature. tput command accepts the terminal commands and output the control code sequences for that terminal. Using tput you can control the color and cursor of your terminal as explained in this article. 1. Set the Cursor P
Merry Christmas and Happy Holidays to all TGS Readers. To wrap this year, I’ve collected 50 UNIX / Linux sysadmin related tutorials that we’ve posted so far. This is lot of reading. Bookmark this article for your future reference and read it whenever you get free time. Disk to disk backup using dd command: dd is a powerful UNIX utility, which is used by the Linux kernel makefiles to make boot imag
5 Ways to Execute UNIX / Linux Commands (and Shell Scripts) in Background Question: I know how to execute a Unix command in the foreground. Can you please explain me how I can execute a Linux command in the background? Answer: You can use one of the 5 methods explained in this article to execute a Linux command, or shell script in the background. 1. Execute a command in the background using & You
50 Most Frequently Used UNIX / Linux Commands (With Examples) This article provides practical examples for 50 most frequently used commands in Linux / UNIX. This is not a comprehensive list by any means, but this should give you a jumpstart on some of the common Linux commands. Bookmark this article for your future reference. Did I miss any frequently used Linux commands? Leave a comment and let m
6 Expect Script Examples to Expect the Unexpected (With Hello World) Expect scripting language is used to feed input automatically to an interactive program. It is easy to learn compared to other scripting languages. Using expect script sysadmins and developers can automate redundant tasks easily. It works by expecting specific strings, and sending or responding strings accordingly. Following thre
The Ultimate Linux Soft and Hard Link Guide (10 Ln Command Examples) There are two types of links available in Linux — Soft Link and Hard Link. Linux ln command is used to create either soft or hard links. This article explains how to create soft link, how to create hard link, and various link tips and tricks with 10 practical examples. $ ls -l total 4 lrwxrwxrwx 1 chris chris 10 2010-09-17 23:40
rsync stands for remote sync. rsync is used to perform the backup operation in UNIX / Linux. rsync utility is used to synchronize the files and directories from one location to another in an effective way. Backup location could be on local server or on remote server. Important features of rsync Speed: First time, rsync replicates the whole content between the source and destination directories. Ne
All IT projects needs a bug tracking (or issue tracking, or defect tracking) system. Sure, we need a bug tracking system for a software development project. But, what about a sysadmin team, dba team, network team? They all need some help to track their work, and issues of their system, database and network. I’ve listed 10 open source bug tracking systems, that you can experiment, and choose based
This is a guest post written by SathiyaMoorthy. Using ramfs or tmpfs you can allocate part of the physical memory to be used as a partition. You can mount this partition and start writing and reading files like a hard disk partition. Since you’ll be reading and writing to the RAM, it will be faster. When a vital process becomes drastically slow because of disk writes, you can choose either ramfs o
Question: I would like to know how to install, uninstall, verify deb packages on Debian. Can you explain me with an example? Answer: Use dpkg to install and remove a deb package as explained below. On Debian, dpkg (Debian package system) allows you to install and remove the software packages. dpkg is the simplest way to install and uninstall a package. Debian now supplies a tool named Apt (for “A
Command line options in Perl could be useful to do smaller tasks effectively. In this article, let us review how to use Perl command line options to do the following tasks: Edit file content Handle line separator Check syntax errors Load modules Perform looping Execute perl code Set input line separator Split the input line etc., 1. Perl -i Option: Edit file contents It opens files one by one and
An array is a variable containing multiple values may be of same type or of different type. There is no maximum limit to the size of an array, nor any requirement that member variables be indexed or assigned contiguously. Array index starts with zero. In this article, let us review 15 various array operations in bash. This article is part of the on-going Bash Tutorial series. For those who are ne
Earlier we discussed the basics of how to write and execute a perl program using Perl Hello World Example. In this article, Let us review how to debug a perl program / script using Perl debugger, which is similar to the gdb tool for debugging C code. To debug a perl program, invoke the perl debugger using “perl -d” as shown below. # perl -d ./perl_debugger.pl To understand the perl debugger comman
As we discussed earlier in our basic ssh client commands article, when you do ssh to a machine for the 1st time (or whenever there is a key change in the remote machine), you will be prompted to say ‘yes’ for authenticity of host. This feature is controlled using StrictHostKeyChecking ssh parameter. By default StrictHostKeyChecking is set to yes. The default setting of “StrictHostKeyChecking yes”
次のページ
このページを最初にブックマークしてみませんか?
『The Geek Stuff』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く