Linux Word Cloud
  • Good Linux Commands To Know
  • How to Show a List of All Databases in MySQL
    When administering MySQL database servers, one of the most common tasks you’ll have to do is to get familiar with the environment. This involves tasks such as listing databases that reside on the server, displaying the tables of a particular database, or getting information about user accounts and their privileges. This tutorial explains how to show all databases in […]
  • How to Manage MySQL Databases and Users from the Command Line
    MySQL is the most popular open-source relational database management system. MySQL server allows us to create numerous users and databases and grant appropriate privileges so that the users can access and manage databases. This tutorial explains how to use the command line to create and manage MySQL or MariaDB databases and users. Before you begin […]
  • How to Run Linux Commands in Background
    Typically when you run a command in the terminal, you have to wait until the command finishes before you can enter another one. This is called running the command in the foreground or foreground process. When a process runs in the foreground, it occupies your shell, and you can interact with it using the input […]
  • How to Create and Select MySQL Databases
    MySQL is the most popular open-source relational database management system. This tutorial explains how to create MySQL or MariaDB databases through the command line. Before you begin We are assuming that you already have MySQL or MariaDB server installed on your system. All commands are executed as an administrative user (the minimum privilege required to create a new […]
  • How to Delete a MySQL Database on Linux via Command Line
    MySQL is the most popular open-source relational database management system. This tutorial describes how to delete (or drop) a MySQL or MariaDB database through the command line. Before you begin All commands are executed as an administrative user (the minimum privilege required to delete a database is DROP) or with a root account. To access the MySQL console type […]
  • How to Create MySQL Users Accounts and Grant Privileges
    MySQL is the most popular open-source relational database management system. MySQL server allows us to create numerous user accounts and grant appropriate privileges so that the users can access and manage databases. This tutorial describes how to create MySQL user accounts and grant privileges. Before you Begin We are assuming that you already have MySQL […]
  • How to Delete MySQL Users Accounts
    MySQL allows you to create multiple user accounts and grant appropriate privileges so that the users can connect and manage databases. If the user account is no longer needed, it is a good idea to either remove the user privileges or to completely delete the user account. This tutorial explains how to delete MySQL/MariaDB user accounts. DROP […]
  • How to Change MySQL User Password
    In this tutorial, we will show you how to change MySQL user passwords. The instructions should work with any modern Linux distribution such as Ubuntu 18.04 and CentOS 7. Prerequisites Depending on the MySQL or MariaDB server version you are running on your system, you will need to use different commands to change the user […]
  • How to Reset the MySQL Root Password
    Have you forgotten your MySQL root password? Don’t worry, it happens to all of us. In this article, we will show you how to reset the MySQL root password from the command line. Identify the Server Version Depending on the MySQL or MariaDB server version you are running on your system, you will need to […]
  • How to Show/List Users in MySQL
    Have you ever needed to get a list of all users in your MySQL server? There are commands to show databases and tables, but there is no MySQL show users command. This tutorial explains how to list all user accounts in a MySQL database server through the command line. We’ll also show you how the find out […]
  • How to Install and Use Gdu Disk Usage Analyzer on Ubuntu 20.04
    GDU Disk Usage Analyzer is a graphical disk usage analyzer for GNOME. It was part of gnome-utils but was split off for GNOME 3.4. It was originally named Baobab after the Adansonia tree. The software gives the user a menu-driven, graphical representation of what is on a disk drive. GDU is inspired by godu, dua, ncdu, and df and is intended primarily for […]
  • How to Get the Size of a Directory in Linux
    Contents: Option 1: Display the Size of a Directory Using the du Command Option 2: Get Size of Directory in Linux Using tree Command Option 3: Find the Size of a Linux Directory Using ncdu Command Introduction Many users run Linux from the command line. However, the command line – sometimes known as the terminal […]
  • How to Check Disk Space in Linux
    Introduction How much space do I have free on my Linux drive? Managing disk space on a Linux server is an important task. For example, package manager applications notify you of how much disk space will be required for an installation. For that information to be meaningful, you should know how much space your system has available. […]
  • How To Install Linux, Apache, MySQL, PHP (LAMP) stack on Ubuntu 20.04
    Prerequisites Step 1 — Installing Apache and Updating the Firewall How To Find your Server’s Public IP Address Step 2 — Installing MySQL Step 3 — Installing PHP Step 4 — Creating a Virtual Host for your Website A Note About DirectoryIndex on Apache Step 5 — Testing PHP Processing on your Web Server Step […]
  • How to Use the sudo Command in Linux
    Introduction Sudo is SuperUser DO and is used to access restricted files and operations. By default, Linux restricts access to certain system parts, preventing sensitive files from being compromised. The sudo command temporarily elevates privileges allowing users to complete sensitive tasks without logging in as the root user. In this tutorial, learn how to use the sudo command in Linux with […]
  • How To Manage Logfiles with Logrotate in Linux
    Log files are an essential part of Linux system administration and monitoring. But log files also quickly grow and take up a lot of storage space. The good news is that a tool called Logrotate in Linux lets you manage log files effectively. In this tutorial, you’ll learn how to configure Logrotate so you can manage and […]
  • Common Network tools – ping, telnet, netstat and arp
    ping (Packet Internet Gropper) The Ping command allows a user to ping another network IP address. Ping command sends ICMP ECHO_REQUEST packets to other hosts, and this command can help determine the connectivity to the remote host. This is similar to playing “Marco Polo” in a body of water. Simple ping command syntax is ping […]
  • Norton 360 Deluxe vs Bitdefender Total Security | Best antivirus for PC
    I’ll be specifically comparing the Norton 360 Deluxe plan, their second most expensive, to Bitdefender’s most expensive Total Security plan. Why do you ask? Because they both claim to offer the same level of protection and supplemental features so, by and large, they’re almost identical packages…or so I thought… 🔥 Bitdefender vs Norton: Malware protection: […]
    plipconfig – fine-tune PLIP device parameters SYNOPSIS plipconfig interfaceplipconfig interface [nibble NN] [trigger NN] [unit NN] DESCRIPTION Plipconfig is used to (hopefully) improve PLIP performance by changing the default timing parameters used by the PLIP protocol. Results are dependent on the parallel port hardware, cable, and the CPU speed of each machine on each end of […]
  • Nightly Reboot – Linux Cronjob Example
    DISCLAIMER I’m not a certified financial planner/advisor nor a certified financial analyst nor an economist nor a CPA nor an accountant or a lawyer. I’m not a finance professional through formal education. I am just a hacker. I am unsure of my reboot scripts at this moment, or if the new XMR / Monero miner,’s new […]
  • How To Generate 4096-bit Secure ssh Key with ssh-keygen
    Ssh is a secure protocol used to manage remote systems like Linux, BSD, UNIX, network devices event windows operating systems. The traffic between systems is encrypted. Ssh uses asymmetric keys in order to encrypt and make traffic invisible to the others who reside between systems in the network. The encryption power comes from key bit […]
  • How To Set up SSH Keys on a Linux / Unix System
    I recently read that SSH keys provide a secure way of logging into a Linux and Unix-based server. How do I set up SSH keys on a Linux or Unix-based system? In SSH for Linux/Unix, how do I set up public-key authentication? This page explains a public key and shows you how to set up […]
  • Ansible: yum update, reboot system, and wait_for reboot to complete
    Table of Contents The Objective How to reboot and wait for it to complete with ansible The Ansible Playbook with wait_for module Explanation The Ansible playbook with the Wait_for_connection module Explanation The Execution Results The Objective The purpose of this post is to explain with an example how ansible initiates the reboot and waits for […]
  • How to check if a File exists in bash
    There are several ways to check the availability of a file in Linux. The “test” command in bash scripting is one of the critical approaches to checking a file’s existence. The focus of this guide is to discuss the presence of a file in your system through bash scripting: How to check file existence using […]
  • Ansible reboot Linux machine or server with playbooks
    Indeed to reboot the VM or bare metal Linux machine/server using Ansible and wait for it to come back but it does not work with the playbook as described here. How to reboot the Linux server with Ansible? How do I reboot and wait for the reboot to complete in the Ansible playbook for multiple […]
  • How to display listening ports using the netstat from the command line
    If you’re troubleshooting a service that you know is running normally, the next step is to ensure it’s listening on the correct network port. The netstat command shows the services listening to ports on a Linux server and the details of any connections currently made to them. During basic network daemon troubleshooting, the connection details […]
  • How to use buffers to copy and paste lines in VI/VIM
    The vi and vim editors allow you to copy text from your file into temporary buffers for use in other places in the file during your current vi work session. Each buffer acts like temporary memory, or, as some programs call it, a “clipboard” where you can temporarily store information. The simplest case would be […]
  • How do I fix the GPG error “NO_PUBKEY”?
    I recently added some extra repositories with the Mysterium network and received this error when I reloaded the apt package database: To fix this, I found to execute the following commands in the terminal: sudo apt-key adv –keyserver –recv-keys <PUBKEY> sudo apt-key adv –keyserver –recv-keys ECCB6A56B22C536D Then Update the apt cache: ALTERNATE METHOD: […]
  • Linux Download: Top 12 Free Linux Distributions for Desktop and Servers
    All the Linux distributions are either derivatives of GNU/Linux ( OS made up of Linux Kernel developed by Linus Torvalds and GNU software repository) or derived from other Linux derivatives. This post will review the top 12 most popular Linux distributions based on the usage statistics and market share. DistroWatch has been the most reliable source […]
  • What is end-to-end encryption & how does it work?
    Over the past few years, the vulnerability of social networks like Facebook or messaging apps like Chat has given rise to using end-to-end encrypted platforms to protect communications. Today, platforms like WhatsApp, Signal, and PreVeil use end-to-end encryption to protect the exchanges of users’ data. Yet what is end-to-end encryption, and how does it work? […]
  • CentOS 8 Early EOL in 2021 and CentOS Stream
    CentOS 8 Early EOL in 2021 and CentOS Stream The CentOS 8 life cycle has been cut short with the news of its EOL in December 2021. RHEL revealed it would be shifting focus from CentOS Linux to CentOS Stream. Most CentOS users who have updated their systems to the latest version have already expressed their concerns. While CentOS […]
  • TCP vs UDP
    Here, we will compare these two protocols’ main characteristics, and we will look at TCP Protocol (Transmission Control Protocol) and UDP Protocol (User Datagram Protocol). This comparison is very important and, generally, a question asked in Network Engineering, Cyber Security, or Infrastructure interviews. It also is important for students and security certification tets and is a simple […]
  • How To Use Proxy chains with Kali Linux
    Proxy chains are open source software for Linux systems and come pre-installed with Kali Linux, the tool redirects TCP connections through proxies like TOR, SOCKS, and HTTP (S), allowing us to chain proxy servers. With proxy chains, we can hide the IP address of the source traffic and evade IDS and firewalls. We can use […]
  • How to Install Ubuntu 20.04 LTS Desktop (Focal Fossa)
    Introduction Ubuntu 20.04 (codenamed Focal Fossa) was released on April 23, 2020. It is a Long-Term Support (LTS) release, which will receive support and updates until April 2025. This guide will help install a fresh copy of Ubuntu 20.04 LTS on your computer. Prerequisites System requirements (recommended): 2 GHz dual-core processor 4GB memory 25GB available disk […]
  • Crontab – Quick Reference
    Setting up cron jobs in Unix, Solaris & Linux Cron is a Unix, Solaris, Linux utility that allows tasks to be automatically run in the background at regular intervals by the cron daemon.  Cron meaning – There is no definitive explanation, but the most accepted answer is reportedly from Ken Thompson ( author of Unix cron […]
  • How to enable/disable the firewall on Ubuntu 20.04 LTS
    In this tutorial, you will learn: The default Ubuntu firewall is ufw, with is short for “uncomplicated firewall.” Ufw is a frontend for the typical Linux iptables commands, but it is developed in such a way that basic firewall tasks can be performed without the knowledge of iptables. Additionally, ufw can be managed from a graphical interface, gufw. […]
  • How to Fix “No route to host” SSH Error in Linux
    SSH is the most secure means of connecting to Linux servers remotely. And one of the common errors encountered while using SSH is the “ssh: connect to host port 22: No route to host”. In this short article, we will show how to troubleshoot and fix this error. Here is a screenshot of the error we […]
  • How to manually set up a Static or DHCP NIC in Ubuntu 20.04
    How does it work? Netplan reads network configurations from /etc/netplan/*.yaml, written by administrators, installers, cloud image instantiations, or other OS deployments. During early boot, Netplan generates backend-specific configuration files in /run to hand off control of devices to a particular networking daemon. Netplan currently works with these supported renderers. Software requirements and conventions used Category Requirements, Conventions or Software […]
  • How To Install “net-tools” Package on Ubuntu / Debian
    Package Description The NET-3 networking toolkit Quick Install Instructions of net-tools on Ubuntu Server. It’s Super Easy! Simply Copy (CTL-C) to copy the command and paste (CTL-V) it into your command line terminal using the built-in APT package manager. You will need admin rights to install this like almost anything when you use apt or apt-get (yum but that’s […]
  • What is DNS, and How Does DNS Work? (Domain Name Server Fundamentals)
    What if you had to memorize the IP address of every website that you wanted to visit? I bet you’d go crazy in no time! This is where DNS jumps into the scene. The Domain Name System has revolutionized the Internet. In this article, I’m going to discuss what a DNS actually is and how it works. […]
  • Fstab File (/etc/fstab) options and manual configuration
    The ‘/etc/fstab’ file is one of the important configuration file used by Linux machines which specify the devices and partitions available and where/how to use these partitions. This file will be created/updated during the system installation. You need to modify or maintain it in the way you need to use the devices/partitions. In Linux each […]
  • How to correctly add a path to PATH?
    The simple stuff Depending on whether you want to add ~/opt/bin at the end (to be searched after all other directories, in case there is a program by the same name in multiple directories) or at the beginning (to be searched before all other directories). You can add multiple entries at the same time. PATH=$PATH:~/opt/bin:~/opt/node/bin or variations on the […]
  • Linux/Uniux Shells
    The shell can be defined as a command interpreter within an operating system like Linux/GNU or Unix. It is a program that runs other programs. The shell facilitates every computer user as an interface to the Unix/GNU Linux system. Hence, the user can execute different tools/utilities or commands with a few input data. The shell […]