results matching 
 results
IntroductionThe concept of the publisher/subscriber (pub/sub) model is not new. It represents the best way for a producer, or publisher, of an information source, to communicate with an information consumer, the subscriber.
SSH, the Secure SHell, is a popular software method of connecting two hosts over network circuits.
Determining how to share files and directories between computers is a common problem — one that has many different solutions.
Data is the most important asset that a business has, so it’s important to know how to protect it from damage and recover it when damage occurs.
This guide demonstrates how to use the Linux mount command to make data storage resources available from a single access point.
Have you ever wondered how certain executables on Linux can be accessed as simple commands from the command line?
According to the official Security Enhanced Linux project page, SELinux is a security enhancement to Linux.
What is e2fsck?e2fsck is a utility that examines ext2, ext3, and ext4 filesystems for errors, and attempts to repair them if possible.
Users, system administrators, developers, and system architects debate the question of whether Windows or Linux is better for any given purpose.
Operating systems, such as Linux, provide an interface between the application software and the underlying hardware.
What is Open Source?In the beginning, back when Remington Rand’s Univac 1, the DEC PDP-1, and IBM System 360 ruled the computing world, all software was open-source software.
Open-source software and technology is proven within the world of both mid-market and enterprise businesses. Most companies across the globe depend on open-source software at nearly every point in their delivery chain.
Every application you use starts as an idea. No matter the platform it’s installed on or its purpose, every piece of software begins in the planning phase.
GNU make is designed as a utility for building large programs. It automatically determines which parts need to be recompiled and issues the commands needed to recompile them.
What is SSH (Secure Shell Protocol)?The Secure Shell Protocol (SSH) increases the security of remote network services through the use of public-key cryptography.
The xargs command is a handy Linux utility that is used to convert input data into a string of arguments.
What Is the Echo Command?The echo command is you can use in the terminal to display the text or string that is passed to it as an argument.
The ps aux command is a tool to monitor processes running on your Linux system. A process is associated with any program running on your system, and is used to manage and monitor a program’s memory usage, processor time, and I/O resources.
The command line terminal is a convenient and fast tool for interfacing with the Linux operating system.
What is cd?On Linux systems, cd is a command that changes the directory you are in when working in the terminal.
Ubuntu has a Mandatory Access Control (MAC) system similar to SELinux, named AppArmor. Both SELinux and AppArmor provide a set of tools to isolate applications from each other to protect the host system from being compromised.
What is Less?On Linux systems, less is a command that displays file contents or command output one page at a time in your terminal.
What is journalctl?journalctl is a command for viewing logs collected by systemd. The systemd-journald service is responsible for systemd’s log collection, and it retrieves messages from the kernel, systemd services, and other sources.
What is an Alias?An alias is a custom shortcut set to represent a set of commands or a single command run with specific options.
This guide shows how to use rm to remove files, directories, and other content from the command line in Linux.
What Are Docker and Docker Compose?Docker is a system that provides pre-configured, self-contained applications, frameworks, and software stacks, such as WordPress, Golang, or LAMP.
What is systemd?systemd is a Linux system tool initially developed by the Red Hat Linux team.
What is fsck?fsck, short for file system consistency check, is a utility that examines the file system for errors and attempts to repair them if possible.
This guide is part of a series on Linux commands and features. Not all commands may be relevant to Linode-specific hardware, and are included here to provide an easy to access reference for the Linux community.
This Quick Answer explores some ways to locate and terminate a process from the command line.
tar and gzip provide a standard interface to create archives and to compress files in Linux.
Fish, the Friendly Interactive Shell, is a replacement shell, which, out of the box, offers auto-suggestions; programmable completions based on installed man pages; a fully functional, readable, scripting language; and colored text support.
Security Enhanced Linux is a Linux security module for mandatory or role-based access control. SELinux is packaged with CentOS and Fedora by default, and can be running in one of three modes: disabled, permissive or enforcing.
Git is a version control system that can be used to manage software projects. This guide’s six steps will show you how to initialize a Git repository, stage files for a commit, and commit these files to a local Git repository.
GNU Wget is a non-interactive tool for downloading files from the internet. Wget is a mature package with a robust set of features.
The root user is not active by default in Container Linux, so root login is not available.
GNU nano, or more commonly, nano is the basic, built-in editor for most Linux distributions. In this QuickAnswer, we’ll cover some of the essentials to help you get started.
These are just a few of the many commands and tricks available in the Linux terminal.
In this guide, you’ll learn how to use the head command. Using head is a simple way to show the beginning of text files, for example, when analyzing logs and other text files that change over time.
In this guide, you’ll learn how to use the tail command. Using tail is a simple way to show the ends of files, for example, when analyzing logs and other text files that change over time.
In this guide, you’ll learn how to use the grep command. When performing administrative tasks on your Linode, many commands will give you more information than you need.
Bummer! The page you were looking for wasn't found. You can browse our articles or try searching.