If an open file is deleted accidentally, it is possible to use lsof to recreate a copy of the file; provided this is done before the file is closed by the application holding it open.
If you have inadvertently removed a file from the filesystem it is still recoverable if the application using the file it still running. This is because the inode is still open and therefore the data blocks are still on the disk until the application closes the file or exits.
Continue reading “Using lsof to Recover Deleted Files”
This is the part one of the four part series on the basics of how to use Ansible. There will be a gradual introduction from basic to intermediate examples how to install, setup and use Ansible. As well as the how to create ansible playbooks and roles. Let’s get started with Part One: Installation and Setup.
Continue reading “Ansible Part I: Installation and Setup”
Have you ever wondered what all the folders on the root (/) directory of the Linux filesystem are for? Which file goes into which directories and why are they saved in those directories? On this post, we’ll check out each folder and what purpose or function they serve for the operating system itself. Continue reading “The Linux Filesystem Explained”
diff command outputs the differences between two files, line by line. For files that are identical it produces no output, for binary files only reports if they are different or not.
The set of differences produced by
diff is often called a
patch, and this output can be used later on by the patch command to change other files. Continue reading “Comparing files using the diff command”
A server being compromised or hacked for the purpose of this guide is an unauthorized person or bot logging into the server in order to use it for their own, usually negative ends. However, the majority of compromised servers are carried out by bots i.e. automated attack programs, in-experienced attackers e.g. “script kiddies”, or dumb criminals. These sorts of attackers will abuse the server for all it’s worth whilst they have access to it and take few precautions to hide what they are doing.
Continue reading “How To Tell If Your Linux Server Has Been Compromised”
Grep is a very important & powerful Linux commands. It stands for ‘Global Regular Expression Print’ & is used for matching & printing a search pattern or a regular expression from a single or multiple text files. It will look for the pattern if the mentioned files & will than print the result on screen or to an output file.
In this tutorial, we are going to learn to use grep command with examples. Continue reading “How to effectively use the GREP command”
I call these tips and tricks – “bash kung-fu”. You can save a lot of typing with these handy bash features.
bash, or the Bourne again shell, is the default shell in most Linux distributions. It has many features to enhance user-friendliness and productivity. Unfortunately, you can’t take advantage of those features unless you know they exist. So here are some bash tips and tricks that will help you with your everyday system admin tasks.
Continue reading “bash Tips and Tricks”
Every Linux process has a process ID (PID) assigned to it. It is a unique identification number that is automatically assigned to each process when it is created in an operating system. A process is a running instance of a program. In this tutorial we’ll look into ways on how to find the PID of process.
Continue reading “How to find out PID in Linux”