How to Add a New Disk Larger Than 2TB to An Existing Linux

Have you ever tried to do the partitioning of hard disk larger than 2TB using fdisk utility and wondered why you end up getting a warning to use GPT? Yes,... Read more

How to Force User to Change Password at Next Login in Linux

In our last article, we’ve explained you how to change user password expiry information in Linux, where we looked at different examples of the chage command. In this article, we... Read more

How to Manipulate Filenames Having Spaces and Special Characters in Linux

We come across files and folders name very regularly. In most of the cases file/folder name are related to the content of the file/folder and starts with number and characters.... Read more

15 Practical Examples of ‘cd’ Command in Linux

In Linux ‘cd‘ (Change Directory) command is one of the most important and most widely used command for newbies as well as system administrators. For admins on a headless server,... Read more

How to Show Asterisks While Typing Sudo Password in Linux

Most applications normally display a feedback using asterisks (*******) when a user is typing a password, but on the Linux terminal, when a normal user runs the sudo command to... Read more

15 Basic ‘ls’ Command Examples in Linux

ls command is one of the most frequently used command in Linux. I believe ls command is the first command you may use when you get into the command prompt... Read more

Just Host Review

In a Nutshell Affordability is the name of the game with Just Host. The provider's longer-term plans are among the cheapest out there, which makes this a good choice for... Read more

How to Monitor User Activity with psacct or acct Tools

psacct or acct both are open source application for monitoring users activities on the system. These applications runs in the background and keeps track of each users activity on your... Read more

What’s Difference Between Grep, Egrep and Fgrep in Linux?

One of the renowned search tool on Unix-like systems which can be used to search for anything whether it be a file, or a line or multiple lines in file... Read more

How to Scan for Vulnerabilties with ClamAV

How to Scan for Vulnerabilties with ClamAV Introduction The following instructions show how to run a malware scan using ClamAV on your system. This guide will help you investigate a... Read more