X

Linux & Unix

How to prevent that a user deletes a file owned by root in his home directory

Even though a file is held by root and has 700 rights, if the root user saves it in another…

Get a list of all available Linux commands that you can use

We're all familiar with Linux's command-line interface (CLI), which allows you to execute nearly any job you can think of…

How to prevent a Linux system user from logging into the system

The shell setting in /etc/passwd determines whether a Linux system user may log in via the shell or over SSH.…

Get a list of all virtual hosts which are defined in all apache configuration files

Have you ever looked in the apache config files to see where a website's virtual host is defined? The apache2ctl…

Linux Basics: The gunzip command explained (with examples)

The gunzip command is a widely used command for uncompressing files which are made using the gzip utility. It decompresses…

10 Apt Command Examples You Must Know

The apt is the most powerful command-line utility for managing the packages such as installing packages, updating package info, upgrading…

How to download and extract a .deb package on Ubuntu or Debian Linux

Sometimes you require a certain file from a Debian .deb package. For example, because you accidentally deleted a file. Or…

Enable SSL for the ISPConfig 3 Controlpanel Login

Hint: The procedure that is described below is for ISPConfig versions < 3.0.3. For newer ispconfig versions, use the builtin ssl…

Bash Shell Tricks – The brace extension

When working with the Linux command line, there are situations where you need to type large paths. Even if you…

How to Create Multiple Hyper-V Virtual Machines Using PowerShell

Creating multiple Hyper-V virtual machines using Hyper-V manager is not a quick method. The quickest and time-saving method is to create…

X

Headline

You can control the ways in which we improve and personalize your experience. Please choose whether you wish to allow the following:

Privacy Settings