On Linux, virtual network interface configuration isn’t something most people need to do very often, but it can come in handy sometimes. The system will recognize a virtual interface as a real, physical interface. linux create virtual network interface
The kernel of a Linux system is the core that everything else in the operating system relies on. The functionality of the kernel can be extended by adding modules to it by use of a specific Linux kernel commands. As such, a user can fine tune their kernel settings by enabling or disabling modules. This level of granular control is one of the many reasons why users love Linux in the first place.
Tar (Tape ARchiver) is one the most useful utilities in the toolbox of every Linux system administrator out there. With tar we can create archives which can be used for various purposes: to package applications source code, for example, or to create and store data backups.
After installing SSH on your Linux system, one of the most important security practices it to make sure that the service is only enabled for intended accounts. If you have one or more accounts which do not need SSH access, then the service should be disabled for those accounts. This is to prevent one being exploited, or maybe you just do not want that particular user to be using SSH to access the server.
There is no need to install tons of software in order to create a nice and informative presentation. tpp, which stands for Text Presentation Program is a simple to use command line presentation tool which allows you to create a fancy text based slide show presentation and share it with your colleagues or students as an ordinary ASCII text file. tpp utilizes ncurses, and it supports colors, slide-in, source code output, animated command line execution and a real time command executions all available from within your terminal.
Depending on your server room conditions it may be important to be informed about the hard drive temperatures inside of your servers. System administrators may use Bash and cron to write a simple script that can alert them about sudden temperature change. Various command line tools such as
hddtemp can check your HDD temperature and be used inside of a Bash script.
Every network interface, on any device, has its own MAC address. Unlike IP addresses, which can change frequently and easily, MAC addresses are permanently tied to the hardware. Although you can spoof your MAC address with software, the real MAC address of your network interface will never change.
If you encounter the error
locate command not found on your Linux system, it likely means that you do not have the software installed and therefore can’t use this command. In this tutorial, we will remedy the issue by showing you how to install the
locate command on all major Linux distros. You will then see some basic usage examples of the
Hibernation, also known as “suspend to disk”, is the most efficient power saving mode in terms of energy consumption. On hibernation, the state of the random access memory is stored on disk, and the machine is completely power down. Although efficient, hibernation is commonly not recommended if using a solid state drive, because each time the system enters this power state, a lot of data must be written to disk, which as we know, has a limited number of write cycles. For this and other reasons, as the the low number of machines on which hibernation works reliably on Linux, Fedora decided to disable this power state by default.