What is your job role?I'm an IT pro looking to sharpen my skills or earn a certificate.I lead an IT team and am looking for training resources.I'm not an IT pro, but interested in entering the field.Other By submitting this form you agree to receive marketing emails from CBT Nuggets...
The point where the kernel starts its first user-space process, init, is significant—not just because that’s where the memory and CPU are finally ready for normal system operation, but because that’s where you can see how the rest of the system builds up as a whole. Prior to this p...
Hack Your Linux System Without Using Single User Mode OK, so you might be feeling better knowing your system is secure. However, this is only partially true. While it’s true that your Linux box can’t be easily compromised using single-user mode, there are other ways it can still be h...
o /proc Provides system statistics through a browsable directory-and-file interface. Much of the /proc subdirectory structure on Linux is unique, but many other Unix variants have similar features. The /proc directory contains information about currently running processes as well as some kernel param...
The point where the kernel starts its first user-space process, init, is significant—not just because that’s where the memory and CPU are finally r...
Monitor Linux Process Memory Usage If for some reason a process starts taking too much system resources and it’s likely to jeopardize the overall functionality of the system, you will want to stop or pause its execution passing one of the following signals using thekillprogram to it. Other ...
For Red Hat Enterprise Linux 8, the RHCE exam has shifted to a heavy emphasis on server management viaRed Hat Ansible. Choose the appropriate course Courses for the RHCSA The course is targeted at system administrators with a non-Linux background or those who need to expand their existing Lin...
Want to learn more about Linux security? Have a look at the open source tool Lynis and become a Linux security expert yourself. Lynis is a battle-tested technical security audit tool. It is open source, freely available, and used by system administrators all over the world. Other users incl...
In this tutorial, we will show you how to use the gpasswd command on a Linux operating system. The gpasswd command allows you to edit a group’s password, members, and administrators. It is used to edit both the /etc/group and /etc/gshadow files. If you use the command without any ...
Even on Linux, if you use an X Window system, you can use the mouse to just click on a new program and open it. On the command line, however, you’re pretty much stuck with what’s on your screen at any given time. In this tutorial, we will show you how to multi-task in ...