Need to SSH to an unreachable Linux computer? Have it call you, then burrow down that connection to get your own remote SSH session. We show you how.
Want to remotely access a Linux machine and launch a graphical application? PuTTY to the rescue, thanks to the “enable X11 forwarding” option. You can even do this from Windows—all you need to do is quickly install an X ser…
What does the tty command do? It prints the name of the terminal you’re using. TTY stands for “teletypewriter.” What’s the story behind the name of the command? That takes a bit more explaining.
Don’t risk data loss. Back up your valuable data from the Linux command line. We’ll be using the rsync command for this, and we’ve even found some nice optional graphical interfaces for it.
Want to see the text inside a binary or data file? The Linux strings command pulls those bits of text—called “strings”—out for you.
Use Linux’s ar command to create function libraries when you’re developing software. This tutorial will show you how to create a static library, modify it, and use it in a program, complete with sample code….
Think you know what’s connected to your home network? You might be surprised. Learn how to check using nmap on Linux, which will let you explore all the devices connected to your network.
Want to find out about the people logged on to your Linux computer? Well, don’t lift a finger; raise your pinky instead.
Find out exactly what devices are inside your Linux computer or connected to it. We’ll cover 12 commands for listing your connected devices.
Linux offers six different ways to search, and each has its merits. We’ll demonstrate how to use find, locate, which, whereis, whatis, and apropos. Each excels at different tasks; here’s how to choose the right tool for the j…
Find out if a command resolves to an alias, a disk file, a shell function, a built-in command, or a reserved word. Use type to discover how your Linux commands are executed and understand your system better….
If everything in Linux is a file, there has to be more to it than just files on your hard drive. This tutorial will show you how to use lsof to see all the other devices and processes that are being handled as files….
Shred old data files for the same reason you shred old paper documents. We tell you what you need to know about securely deleting Linux files. This tutorial covers the shred command and the secure-delete suite of utilities….
Know you should upgrade your Linux filesystem but can’t face the aggravation? Here’s how to convert ext2 and ext3 to ext4 without the upheaval of a complete re-install.
Your Linux or macOS computer is using virtual memory. Discover how it’s affecting your system’s use of physical memory, CPU, and hard disk resources.
The cat and tac commands display the contents of text files, but there’s more to them than meets the eye. Dive a little deeper and learn some productive Linux command line tricks.
Take cybersecurity seriously and use SSH keys to access remote logins. They’re a more secure way to connect than passwords. We show you how to generate, install, and use SSH keys in Linux.
Get to grips with the file renaming powerhouse of the Linux world and give mv—and yourself—a rest. Rename is flexible, fast, and sometimes even easier. Here’s a tutorial to this powerhouse of a command….
OK, that’s enough computer time. You can give processes time limits, setting a maximum time they can run for with the timeoutcommand. Here’s a tutorial to putting limits on running programs with this command….
The Linux patch command lets you transfer the changes from one set of files to another set of files quickly and safely. Learn how to use patch the simple way.
Who, when, and from where? Good security practices say you should know who’s been accessing your Linux computer. We show you how.
Want to know how long a process runs and a whole lot more? The Linux time command returns time statistics, giving you cool insights into the resources used by your programs.
Need to get a quick message out to all logged-in users? Linux’s wall command is punchier than email and auto-targets the logged-in users. It broadcasts a message to everyone using a terminal on a system….
The yes command seems too simple to be of any practical use, but in this tutorial, we’ll show you its application and how to benefit from its pent-up positivity in Linux and macOS.
File systems in Linux and Unix-like operating systems like macOS can be mounted, unmounted, and remounted using the terminal. This is a powerful and versatile tool—here’s everything you need to know….