If you want to learn Linux for FREE, open this (a thread of our Linux threads):
1. Permissions
The operating system controls file access in Linux by utilizing file permissions, attributes, and ownership. In Linux, file permissions, attributes, and ownership determine the level of access that system programs and users have to files.
The basename command in Linux prints the last element of a file path. This is particularly helpful in bash scripts where you only want the file name from a given file path.
pushd and popd give you the ability to manage your directory stack and easily switch between directories, making them a must-have tool for any Linux user looking to maximize their efficiency and productivity:
Logs are a critical component of system and application management, providing valuable info for troubleshooting, performance analysis, security analysis, and compliance.
Most people who knoww Git think of it as a software project repository. It's actually more than that. It's useful for any type of file, but especially for config files that are updated on a regular basis.
As sysadmin or Linux power user in some cases, we may run out of memory, resulting in very slow response times or our server becoming unresponsive, and you will want to know how much memory is being used by the process.
11. usermod is a cmd-line tool for modifying a user's login details.
It is used to change the information of an existing user account, such as the username, user ID, home directory location, user groups, password, default login shell, and so on.
Wildcards are characters or groups of characters that enable you to create a pattern for searching or matching text on strings, filenames, or directories.
14. Linux absolute path and relative path explained:
In this thread, we will look at the important concepts of absolute path and relative path, which will allow you to navigate the file system without hesitation.
Learning Linux operating systems is an important skill for various computer science fields. Apart from cybersec Linux knowledge is also beneficial in software development, system admini, data science, and cloud computing, to name a few.
Knowing when and how to stop running processes is a essential skill for sysadmins. When a process becomes stuck, it only takes a gentle nudge to restart or stop it.
When you turn on your Linux computer, it goes through a series of phases before presenting a login screen that prompts you for your username or password.
The Linux find command is a powerful tool that allows system administrators to search for and manage files and directories that match a set of criteria in the filesystem.
Understanding the /etc /passwd file is important for managing users in Linux. The /etc/ passwd is a plain text file that contains all the crucial information for all system user accounts needed when logging in.
34. Everything you need to know about copying files in Linux (Linux basics)
As a system administrator, you will frequently need to copy files and directories from one location in the filesystem to another. The cp command makes this possible.
Most people who know Git think of it as a software project repository. It's actually more than that. It's useful for any type of file, but especially for config files that are updated regularly.
Git is a valuable tool not for only programmers, but also for sysadmins:
Using git can simplifies the administrator's life in a variety of ways.
Learn these 23 Git commands as you'll be using them 99% of the time as a system administrator:
1. git add
Used to add files to the staging area. Before a file is available to commit to a repository, the file needs to be added to the staging area also know as git index.
The Linux sed command is a stream editor that is used to process text file content like searching for patterns, finding and replacing, insertion, and deletion.
Now that you understand what sed is, let's look at some of the things you can do with it.
Knowing when and how to stop running processes is a essential skill for sysadmins. When a process becomes stuck, it only takes a gentle nudge to restart or stop it.
At times, a process takes all the system resources. In both cases, you need a cmd that lets you manage a process.
The Linux operating system includes a number of commands for terminating errant processes (rogue processes), such as pkill, kill, and killall.
This thread will teach you how to use the kill command in Linux.
𝗚𝗲𝘁𝘁𝗶𝗻𝗴 𝘁𝗼 𝗸𝗻𝗼𝘄 𝗟𝗶𝗻𝘂𝘅 𝘀𝗶𝗴𝗻𝗮𝗹𝘀
Linux processes use signals to communicate with one another. A process signal is a predefined message that processes can either ignore or respond to. Developers define how a process will handle signals.
In Linux, most people use the ls command to check a file's creation, access, and modification times, ownership, and permissions.
What if I told you there is another great way to display detailed information about files and file systems?
Open this thread to learn more about it:
The Linux ls command typically displays basic or chunk of information about a file; however, what if you want to print more information about the file? This is where the stat command comes in.
stat (short for status) is a command-line utility for displaying detailed information about specific files or file systems. It is commonly used to obtain file timestamps.
In Linux, if you run a command or script in a terminal, it will be terminated as soon as you exit your terminal.
But what if you want it to run in the background until it finishes, even if you exit the terminal? The nohup allows you to do that.
Learn more on nohup in this 🧵↓
The nohup command, which stands for "no hangup," executes another program specified as its argument while blocking all SIGHUP (hangup) signals sent to the program or process.
SIGHUP is a signal that is sent to a process reporting that the terminal controlling it has disconnected or closed.
In addition to UGO/RWX permissions and ACLs (Access Control Lists), Linux uses file and directory attributes to control the level of access that system programs and users have to files.
Let’s dive in!
File and directory attributes can be set and removed using different commands and utilities. Let's explore some commonly used attributes and how to manage them.
1. Immutable Attribute:
The immutable attribute prevents a file or directory from being modified, renamed, or deleted, even by the root user. It provides an extra layer of security to critical system files or sensitive data.