How To List Users In Linux (Ubuntu, Mint, Debian, CentOS)?

How To List Users In Linux (Ubuntu, Mint, Debian, CentOS)?

Users are one of the most important parts of the Linux operating systems like Ubuntu, Debian, Mint, Kali, CentOS, etc. By creating user accounts different users and people can log in and use the Ubuntu system with their own permissions, files, and configuration. This tutorial can be used to list users in VM, Guest, VPS, … Read more

Linux time Command Tutorial

Linux time Command Tutorial

Linux is a multitasking operating system that shares resources with different processes. Every process takes some CPU, memory, and similar resources which can be monitored with the time command. The time command is also used for performance testing which is generally used to test and count the performance of the scripts and commands. The time … Read more

How To Edit Files In Linux?

How To Edit Files In Linux?

Linux provides different ways and tools in order to edit files. These methods can be called command-line editors and GUI editors. As a text-based operating system and most of the configuration is stored as a text file the configuration changes generally require editing files. Why Edit Files In Linux? As stated Linux is a command-line … Read more

$0 Script File Name Parameter Usage In Linux Bash

$0 Script File Name Parameter Usage In Linux Bash

Bash provides different parameters to get input from different sources. $0 is a special parameter that is used to store the name of the bash script. This $0 parameter is automatically assigned by the bash or bash interpreter and can not be changed in a script file like a regular variable. This makes it a … Read more

How To Generate SSH Public/Private Keys?

How To Generate SSH Public/Private Key?

SSH is a popular protocol used to manage systems remotely, transfer files, etc. SSH provides access to the remote systems in a secure way by encrypting the communication which is transferred over the computer networks. SSH also protects security by making authentication to access remote systems. Authentication can be done in different ways. The most … Read more

Linux arping Command Tutorial

Linux arping Command Tutorial

The arping command is a command-line tool used in the Linux operating system to discover and detect hosts on the network. The arping uses the ARP protocol in order to ping hosts with the Layer 2 ARP requests. The ARP protocol is used to resolve IP addresses to the MAC addresses in order to communicate … Read more

Ping Command In Linux with Examples

Ping Command In Linux with Examples

The ping command is provided by the Linux distributions like Ubuntu, Debian, Mint, Kali, CentOS, RHEL, SUSE by default. The term ping is the short form of the “Packet Internet Groper”. The ping command is used to check remote system network connectivity and troubleshoot the problem. The ping command uses the ICMP protocol and packets … Read more

How To Comment In vimrc (Vim Configuration) File?

How To Comment In vimrc (Vim Configuration) File?

As an advanced text editor, Vim has a lot of configuration options. These configuration options can be applied in different ways as temporary or permanent. The vimrc configuration file is used for permanent Vim configuration. While putting configurations inside the vimrc file we may need to write some comments in order to explain the given … Read more