BASH (Bourne Again SHell) is the default shell in practically all Linux-based operating systems. All the commands we write in the terminal are interpreted by the shell, and become part of its history. In this tutorial we see where the shell history is saved, and how to manage it using the “history” built-in command and some environment variables.
Tagging music files is a way of keeping a music library well organized and let us search for songs on the base of Artists, albums, genre and other parameters. Many graphical and command line applications exist on Linux to manage tags for audio files, like Picard or Quodlibet.
MySQL is probably the most famous Relational Database Management System (RDBMS). Developed as a free and open source software, it was originally backed by the MYSQL AB company, but is now owned by Oracle. In MySQL the “storage engine” used for a table determines how data is handled.
In a Linux based operating system, the crypttab file (
/etc/crypttab), is used to store static information about encrypted block devices which are meant to be set up and unlocked at boot. In this tutorial we learn how it is structured and how to organize data in it.
Temporary files and directories are very important: they can be used from shell scripts for example, to store information which are necessary to complete some tasks and can be safely removed once the work is done. In this tutorial we will see how to safely create temporary files and directories using the
mktemp utility on Linux.
In a previous article we talked about listening and extracting the content of an initramfs image using standard, simple tools like gzip, dd and cpio or with dedicated scripts like lsinitramfs, lsinitrd and unmkinitramfs. In this tutorial we learn how to (re)build an initramfs on Linux using dracut.
Suppose we have our Linux system setup with an almost-full disk encryption, with only the
/boot partition unencrypted. Assuming we achieved encryption by using a LUKS container, we need the appropriate software to unlock it at boot.
This tutorial is part of a series we dedicated to Ansible. Previously we talked about the Ansible basics, then we focused on some Ansible modules we can use to perform some very common administration tasks, and we also talked about Ansible loops. In this article, instead, we learn how to create interactive prompts we can use to ask for user input and how to pass variables at runtime.
Although the cpio archiving utility is nowadays used less than other archiving tools like tar, it is still good to know how it works, since it is still used, for example, to create initramfs images on Linux and for rpm packages, which are used mainly in the Red Hat family of distributions.
Passwords should never be stored as plain text. Whether we are talking about a web application or an operating system, they should always be in hash form (on Linux, for example, hashed passwords are stored in the