tag:blogger.com,1999:blog-8501896183750005272024-03-19T10:04:00.254+05:30TechChezMachindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.comBlogger60125tag:blogger.com,1999:blog-850189618375000527.post-271135438612805452023-04-29T03:01:00.004+05:302023-04-29T03:01:30.836+05:30Future of Docker and Containerization TechnologiesDocker and containerization have revolutionized the way software is developed, shipped, and deployed. They have made it easier for developers to build, test, and deploy applications, and have made it possible for organizations to achieve faster time-to-market and improved scalability. However, as technology evolves, the future of Docker and containerization remains uncertain. Here are some Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com0tag:blogger.com,1999:blog-850189618375000527.post-70286883731098216172023-02-12T17:39:00.000+05:302023-02-12T17:39:20.821+05:30Trending technologies - Linux Here are a few trending keywords for Linux blogs in 2023:Linux security: As cyber threats continue to evolve, Linux security remains a hot topic. Content related to Linux security, such as how to secure a Linux system, common security threats, and best practices for keeping a Linux system secure, is likely to be in high demand.Linux administration: Linux administration and management is an Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com0tag:blogger.com,1999:blog-850189618375000527.post-75916310314136756032023-02-12T17:00:00.002+05:302023-02-12T17:00:24.781+05:30New features of Linux operating SystemAs a constantly evolving open-source operating system, Linux is continuously updated with new features and improvements. Here are some of the new features and improvements in recent releases of the Linux operating system:Linux Kernel 5.10: This release includes support for the latest hardware, improved power management, better file system performance, and better support for modern processors and Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com0tag:blogger.com,1999:blog-850189618375000527.post-81578522946525091562014-02-10T22:19:00.000+05:302014-02-10T22:19:53.742+05:30Get interface statistics using netstat command
<!--[if gte mso 9]>
Normal
0
false
false
false
EN-US
X-NONE
X-NONE
<![endif]-->
<!--[if gte mso 9]>
Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com0tag:blogger.com,1999:blog-850189618375000527.post-20716748855798663002014-02-10T22:16:00.000+05:302014-02-10T22:16:54.926+05:30Netstat command basics
<!--[if !mso]>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
<![endif]-->
<!--[if gte mso 9]>
Normal
0
false
false
false
false
EN-US
X-NONE
X-NONE
<![endif]--><!--[if Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com0tag:blogger.com,1999:blog-850189618375000527.post-82347055618544942382013-10-25T21:29:00.000+05:302013-10-26T13:47:08.482+05:30Sticky Bit: User Ownership access-right Flag in Unix
Sticky bit is a
bit set in permission of a file or directory to give special access –rights to
user. When we set the sticky bit for any
executable file, it will remain in swap space after the process exited. It
will help to reduce time of execution in repeatedly used programs. So, we can
set this sticky bit for frequently used programs like editors, commands etc.
So, execution of them will beMachindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com0tag:blogger.com,1999:blog-850189618375000527.post-80590833468602179592013-10-23T21:41:00.000+05:302013-10-26T14:01:38.011+05:30SetUID, SetGID bit : Special Permission in Linux
Sticky bit concept and implementation Check CPU usage of file system
SetUID:
SetUID is a set User
ID upon execution. We can identify SetUID bit is set or not in permissions
of file by long listing the details of file as below.
[linuxconcepts@localhostMachindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com0tag:blogger.com,1999:blog-850189618375000527.post-67015395335545948652013-09-17T21:47:00.001+05:302013-10-26T13:53:57.168+05:30Graphics/Image Editing open source applications in Linux
Mostly Asked interview questions How to recover delete files in linux
There are many open source applications in Linux available
for graphic designer or image editing purpose.
Some of them, I have mentioned below and I will come Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com0tag:blogger.com,1999:blog-850189618375000527.post-56376288321322023752013-08-06T01:17:00.000+05:302013-08-06T01:17:25.985+05:30Most Asked Question : Unix Interview questions and answers
Advanced use of sed command useful tricks of sed command
UNIX is an open source operating system. It is a multiuser,
multitasking operating system and developed in 1969 at AT & T’s laboratory.
First, it Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com5tag:blogger.com,1999:blog-850189618375000527.post-5184320617794323872013-07-31T23:48:00.002+05:302013-10-26T14:02:41.804+05:30Blkid command in Linux
Interview Questions for Linux Administrator Linux Commands & Tools
There are many devices or mount points mounted on system.
But sometimes, we need to mount these mount points by unique ID. This case
generally happens in Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com0tag:blogger.com,1999:blog-850189618375000527.post-90275472282304038622013-07-31T23:41:00.000+05:302013-10-26T14:03:41.367+05:30How to add shell in Linux : Add-shell command
VI Editor Useradd Command in Linux
There are Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com0tag:blogger.com,1999:blog-850189618375000527.post-90416604188288468252013-07-30T10:53:00.002+05:302013-10-26T14:05:08.391+05:30VI Editor : Text Editor in Linux
Crontab in Linux Steps to create Logical Volume
Vi editor works
as text editor in Linux. We can create, modify, search and Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com2tag:blogger.com,1999:blog-850189618375000527.post-25657758366666779822013-07-29T14:11:00.000+05:302013-07-30T10:10:37.369+05:30Top 10 basic linux commands for beginners
Check CPU usage in Linux Interview Questions for Linux Administrator
There are many commands which needed to know beginner of Unix
OS. But it is not possible to understand all commands in one day. If you really
new to Linux then please go Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com0tag:blogger.com,1999:blog-850189618375000527.post-39008563098466837122013-06-03T21:40:00.000+05:302013-08-15T12:04:01.568+05:30Not able to delete file by rm command in Linux
Check Network Speed in Linux Find Command examples
This article is part of a unix shell scripting tutorial. We must know liitle things like below while writing shell scripts in linux.
Sometimes, Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com2tag:blogger.com,1999:blog-850189618375000527.post-31538113437384431922013-06-03T20:38:00.000+05:302013-06-11T00:05:19.873+05:30How to check network speed of Linux by Command
Netstat Command in Linux vmstat Command in Linux
It is very easy to check local network speed
in Windows but if you have putty access to Linux machine then we are facing
Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com3tag:blogger.com,1999:blog-850189618375000527.post-11282605843002776042013-06-03T20:30:00.000+05:302013-06-11T00:06:41.543+05:30Find Command in Linux: Examples of ctime, type, newer, inum, Uid
Not able to delete files in Linux Find command with mtime and atime options
Find command in linux is most
important for linux administrators as well as shell script developers. It is
really very fast in execution speed and it is Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com1tag:blogger.com,1999:blog-850189618375000527.post-8277375080782402962013-06-03T20:21:00.002+05:302013-06-11T00:07:31.321+05:30Find command in Linux : mtime and atime examples
chkconfig config command to enable startup service nmap tool to get network statistics
Find command is most powerful command in linux to find files
as per our criteria. It is used not only
to search files but also to run different commands on those files. Mostly we
are searching files by Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com2tag:blogger.com,1999:blog-850189618375000527.post-86244370773848219772013-05-20T00:01:00.000+05:302013-06-11T00:11:21.539+05:30Basic uses of tar command in Linux
Tar command is
specially designed to zip and extract the data. It helps to reduce the space
while getting backed up data. It is used to store and extract files from an
archive file. Let’s understand tar
command with examples:
How to archive folder
in tar extension by tar command
Tar command requires two arguments
to archive the folder i.e. first argument is output file name with tar
Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com1tag:blogger.com,1999:blog-850189618375000527.post-74997633549405037382013-05-10T09:27:00.001+05:302013-06-11T00:11:36.024+05:30Interview Questions for Linux Administrator
Difference between SAN and NAS Netstat Command in Linux
<!--[if !supportLists]-->1.
<!--[endif]-->What are the run levels?
There are total seven run levels as follows:
0 – halt
1—single user mode
2—multiuser mode without NFS
3—Multiuser with Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com5tag:blogger.com,1999:blog-850189618375000527.post-86150650973845348042013-04-26T10:03:00.000+05:302013-06-11T00:13:07.962+05:30Difference between Soft Link and Hard Link
Before understanding the difference between soft link and hard link, we need to understand the concept of soft link and hard
link as well as concept of Inode in unix
file system. Actually, link concept originated to replicate the file at
different location without copying it and it is based on file system. File
System is closely related withinode which is unique in system.
How to
Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com0tag:blogger.com,1999:blog-850189618375000527.post-49219161267332197532013-04-26T10:01:00.000+05:302013-08-15T10:07:31.762+05:30Inode : Unix Operating system concept
Advanced use of sed command in Linux mpstat command to check cpu usage
Inode in file system is
a fundamental concept of unix file system and each object in the file system
represented by an inode. Inodes store
information about files and directories like ownership, access mode, Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com0tag:blogger.com,1999:blog-850189618375000527.post-63205486144719541962013-04-24T08:41:00.000+05:302013-08-15T10:21:14.431+05:30Advanced Sed Substitution using regular expression
How to provide expiry date to user How to change login shell of user
We will go through the examples of Sed substitution using regular expression as follows. Sed command in unix examples, we have given as follows. For all examples, we will considerMachindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com1tag:blogger.com,1999:blog-850189618375000527.post-78835042743223684212013-04-17T21:14:00.000+05:302013-04-26T08:32:27.915+05:30Groupadd, Groupdel Command examples : Ubuntu/Linux/Solaris
Useradd command examples usermod command examples
Groupadd command is used to create a new group account using the
specified values with options or default values from the system. All
information related to the group added Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com2tag:blogger.com,1999:blog-850189618375000527.post-69326513568348895062013-04-17T20:20:00.000+05:302013-04-25T09:51:45.511+05:30Usermod command examples: Ubuntu/Linux/Solaris
How to Remove HTML tags from HTML file using sed Command
Usermod command is used to
modify user account. This command is useful to change the parameters of only
existing users. It can change home directory of existing user, login name,
login shell, comment of passwd file etc.
We will understand usermod command with examples:
How to change home directory of existing user?
Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com0tag:blogger.com,1999:blog-850189618375000527.post-73561025737306569892013-04-16T23:14:00.001+05:302013-04-26T08:27:54.767+05:30Useradd Command Examples: Ubuntu/ Linux/ Solaris
Change Properties of Existing user Groupadd/Groupdel command
Useradd command is very useful in unix to add
user or update the user’s information or user’s home directory, comment etc.
Almost all options are same for useradd command in solaris/Linux/Machindra Dharmadhikarihttp://www.blogger.com/profile/11467449801088744252noreply@blogger.com1