Introduction
Administrators should know what processes are running and the consumption of each of them.
That's why you need tools to help you to monitor your...
Introduction
Root user or as we commonly say super user (privileged user) is the most dangerous user in our environment because of its powerful capabilities...
Introduction
Tail : is built in command on unix systems or unix-like operating systems Like :
386BSD.Arch Linux.AIX.Android.BSD NET/2.Debian.DragonFly BSD.GNU Hurd.
Usage : used to display the...
Introduction
Head : is built in command on unix systems or unix-like operating systems Like :
386BSD.Arch Linux.AIX.Android.BSD NET/2.Debian.DragonFly BSD.GNU Hurd.
Usage : used to display...
Introduction
On Linux and UNIX operating systems, you can use the mount command to attach (mount) file systems and removable devices such as USB flash drives at...
Introduction
Creating disk partitions enables you to split your hard drive into multiple sections that act independently.
In Linux, users must structure storage devices (USB and...
INTRODUCTION
These are some of those critical programs for your computer. Without these, your computer will not know where to find any of the partitions...