Have you ever wondered what all the folders on the root (/) directory of the Linux filesystem are for? Which file goes into which directories and why are they saved in those directories? On this post, we’ll check out each folder and what purpose or function they serve for the operating system itself. Continue reading “The Linux Filesystem Explained”
diff command outputs the differences between two files, line by line. For files that are identical it produces no output, for binary files only reports if they are different or not.
The set of differences produced by
diff is often called a
patch, and this output can be used later on by the patch command to change other files. Continue reading “Comparing files using the diff command”
A server being compromised or hacked for the purpose of this guide is an unauthorized person or bot logging into the server in order to use it for their own, usually negative ends. However, the majority of compromised servers are carried out by bots i.e. automated attack programs, in-experienced attackers e.g. “script kiddies”, or dumb criminals. These sorts of attackers will abuse the server for all it’s worth whilst they have access to it and take few precautions to hide what they are doing.
Grep is a very important & powerful Linux commands. It stands for ‘Global Regular Expression Print’ & is used for matching & printing a search pattern or a regular expression from a single or multiple text files. It will look for the pattern if the mentioned files & will than print the result on screen or to an output file.
In this tutorial, we are going to learn to use grep command with examples. Continue reading “How to effectively use the GREP command”
We might have come across a situation where we might want to rename user in Linux system, for whatever reasons. We can easily rename user in Linux and also we can rename the home directory or its UID as well.
In this short tutorial, we will be discussing these things only.
Continue reading “Properly rename user accounts in Linux”
Universal Serial Bus, more commonly known as the USB has been around for quite some time now with almost every device following the standard. From our I/O devices to storage drives and even mobile phones can be connected using the USB standard. USB ports version will be explained below
This standard has evolved over the years from its inception in the mid 90’s and has had multiple versions through its history.
Load balancers are used to distribute the requests/queries to multiple server instances. Most web infrastructures have multiple front-end servers that share the load of the application. Although there are multiple server instances, the end-user only see them a single node. In this tutorial, I’ll walk you on how to configure an Elastic Load Balancer on Amazon, add your web server nodes and point your domain name to the EC2 load balancer.
Multiple front-end web server setups are almost always in use these days. Instead of just one server serving web traffic, you create two or more servers which will share the load evenly to serve requests from users. These servers usually connect to a backend database server. On this tutorial, we’ll walk through the steps on adding another web-front end server by cloning you current web server node.