Category: Operating System

Create new directories and subdirectories in Unix using a single terminal command 0

Create new directories and subdirectories in Unix using a single terminal command

It’s funny how programmers get in a "rut", using the same old coding habits and command line syntax for years on end.  I just found that you can create new directories and subdirectories with...

Print Friendly, PDF & Email
8 Great Netcat (nc) unix commands 0

8 Great Netcat (nc) unix commands

Netcat or nc (the command) is a networking utility for debugging and investigating a network, typically by creating and utilizing raw TCP/IP connections.  Known as “The Swiss Army Knife for TCP/IP”, nc is used...

Print Friendly, PDF & Email
Running linux scripts and services during CentOS / Redhat/ Fedora startup 0

Running linux scripts and services during CentOS / Redhat/ Fedora startup

Running commands and shell scripts on startup/boot Do you need to run a set of commands or a shell script on CentOS / RHEL / Fedora startup?  The easiest way to start a script...

Print Friendly, PDF & Email
0

Windows 8 first time install – thoughts

I downloaded and installed the Windows 8 Consumer Preview on a VMWare virtual machine. I had a Windows 8 Technical Preview installed on the VM and the Windows 8 Consumer Preview happily installed on top of it. Installation went quite well although it took a couple of hours to complete (on a quad-core processor). Here’s a few screenshots taken during my walkthrough of the Windows 8 desktop system.

Print Friendly, PDF & Email
Passwordless logins in Unix 0

Passwordless logins in Unix

Connecting via SSH, requires a user provide his identity to the remote machine using one of several methods. One method lets you access the remote system without entering a password at each login. Normally, when you log in to a system, you authenticate by entering your password for that system. Your password goes, as it is typed, to the remote system, which authenticates it against the /etc/passwd or /etc/shadow file. By contrast, SSH allow a “password-less” authentication method based on public-key cryptography.

Print Friendly, PDF & Email
Useful Unix Commands 0

Useful Unix Commands

Useful Unix commands To search text in files and all subdirectories find [directory] -name [files] | xargs grep [text to search for] Example to find “insert” in the odb directory (search all files in...

Print Friendly, PDF & Email