20 June 201415 May 2023General Topics, InterviewBy Admin Interview Questions – What is a Linux Operating System? – Linux is a very popular operating system Just like Windows XP, Vista, 7, which is widely used in almost all […]
20 June 201416 May 2023Linux CommandsBy Admin how to use gzip and its examples Examples: 1. To compress any file $ gzip file 2. To decompress a file $ gzip -d file.gz$ gzip –decompress file.gz$ gzip […]
20 June 201416 May 2023Linux CommandsBy Admin how to use gunzip command with its examples Examples: 1. To unzip any compressed file $ gunzip file.gz 2. To get the License information $ gunzip -L$ gunzip –license 3. […]
20 June 201416 May 2023Linux CommandsBy Admin how to use groupmod command with its examples /etc/group Group account information. /etc/gshadow Secure group […]
20 June 201416 May 2023Linux CommandsBy Admin how to use groupmems command with its examples /etc/group Group account information. /etc/gshadow secure group account […]
20 June 201419 May 2023Linux CommandsBy Admin how to use groupadd command with its examples The groupadd command is used to create new groups on a server. Which is used to manage user groups and their permissions. […]
20 June 201420 May 2023Linux CommandsBy Admin how to use grep command to find text in a file Examples: 1. To interpret PATTERN as an extended regular expression # grep –extended-regexp PATTERN filename# grep -E PATTERN filename 2. To interpret […]
20 June 201420 May 2023Linux CommandsBy Admin how to use getfacl command with its examples The getfacl command is used to retrieve and print the Access Control Lists (ACLs) of a file or directory. ACLs provide more […]
20 June 201420 May 2023Linux CommandsBy Admin how to use fuser command with its examples The fuser command is used to identify which processes are currently have open files, directories, or sockets. is useful for troubleshooting scenarios […]
20 June 201420 May 2023Linux CommandsBy Admin how to use fsck command with its examples The fsck command is run on the file systems to check them and to prevent data corruption during the checking process. Which […]