If an open file is deleted accidentally, it is possible to use lsof to recreate a copy of the file; provided this is done before the file is closed by the application holding it open.
If you have inadvertently removed a file from the filesystem it is still recoverable if the application using the file it still running. This is because the inode is still open and therefore the data blocks are still on the disk until the application closes the file or exits.
Continue reading “Using lsof to Recover Deleted Files”
Have you ever wondered what all the folders on the root (/) directory of the Linux filesystem are for? Which file goes into which directories and why are they saved in those directories? On this post, we’ll check out each folder and what purpose or function they serve for the operating system itself. Continue reading “The Linux Filesystem Explained”
diff command outputs the differences between two files, line by line. For files that are identical it produces no output, for binary files only reports if they are different or not.
The set of differences produced by
diff is often called a
patch, and this output can be used later on by the patch command to change other files. Continue reading “Comparing files using the diff command”
A server being compromised or hacked for the purpose of this guide is an unauthorized person or bot logging into the server in order to use it for their own, usually negative ends. However, the majority of compromised servers are carried out by bots i.e. automated attack programs, in-experienced attackers e.g. “script kiddies”, or dumb criminals. These sorts of attackers will abuse the server for all it’s worth whilst they have access to it and take few precautions to hide what they are doing.
Continue reading “How To Tell If Your Linux Server Has Been Compromised”
Grep is a very important & powerful Linux commands. It stands for ‘Global Regular Expression Print’ & is used for matching & printing a search pattern or a regular expression from a single or multiple text files. It will look for the pattern if the mentioned files & will than print the result on screen or to an output file.
In this tutorial, we are going to learn to use grep command with examples. Continue reading “How to effectively use the GREP command”
We might have come across a situation where we might want to rename user in Linux system, for whatever reasons. We can easily rename user in Linux and also we can rename the home directory or its UID as well.
In this short tutorial, we will be discussing these things only.
Continue reading “Properly rename user accounts in Linux”
Universal Serial Bus, more commonly known as the USB has been around for quite some time now with almost every device following the standard. From our I/O devices to storage drives and even mobile phones can be connected using the USB standard. USB ports version will be explained below
This standard has evolved over the years from its inception in the mid 90’s and has had multiple versions through its history.
Continue reading “USB Ports and Versions Explained”
Load balancers are used to distribute the requests/queries to multiple server instances. Most web infrastructures have multiple front-end servers that share the load of the application. Although there are multiple server instances, the end-user only see them a single node. In this tutorial, I’ll walk you on how to configure an Elastic Load Balancer on Amazon, add your web server nodes and point your domain name to the EC2 load balancer.
Continue reading “Configuring Elastic Load Balancer on Amazon EC2”