How to Install and Use Gdu Disk Usage Analyzer on Ubuntu 20.04
GDU Disk Usage Analyzer is a graphical disk usage analyzer for GNOME. It was part of gnome-utils but was split off for GNOME 3.4. It was originally named Baobab after the…
Cyber Security with a flare
GDU Disk Usage Analyzer is a graphical disk usage analyzer for GNOME. It was part of gnome-utils but was split off for GNOME 3.4. It was originally named Baobab after the…
Contents: Option 1: Display the Size of a Directory Using the du Command Option 2: Get Size of Directory in Linux Using tree Command Option 3: Find the Size of…
Introduction How much space do I have free on my Linux drive? Managing disk space on a Linux server is an important task. For example, package manager applications notify you of how…
Prerequisites Step 1 — Installing Apache and Updating the Firewall How To Find your Server’s Public IP Address Step 2 — Installing MySQL Step 3 — Installing PHP Step 4…
Introduction Sudo is SuperUser DO and is used to access restricted files and operations. By default, Linux restricts access to certain system parts, preventing sensitive files from being compromised. The sudo command temporarily elevates privileges…
Log files are an essential part of Linux system administration and monitoring. But log files also quickly grow and take up a lot of storage space. The good news is…
ping (Packet Internet Gropper) The Ping command allows a user to ping another network IP address. Ping command sends ICMP ECHO_REQUEST packets to other hosts, and this command can help…
plipconfig – fine-tune PLIP device parameters SYNOPSIS plipconfig interfaceplipconfig interface [nibble NN] [trigger NN] [unit NN] DESCRIPTION Plipconfig is used to (hopefully) improve PLIP performance by changing the default timing parameters…
DISCLAIMER I’m not a certified financial planner/advisor nor a certified financial analyst nor an economist nor a CPA nor an accountant or a lawyer. I’m not a finance professional through formal education.…
Ssh is a secure protocol used to manage remote systems like Linux, BSD, UNIX, network devices event windows operating systems. The traffic between systems is encrypted. Ssh uses asymmetric keys…