FILE AND DIRECTORY COMMANDS S.No Description Commands 1 List all files in a long listing (detailed) format ls -al 2 Display the present working directory pwd 3 Create a directory mkdir 4 Remove (delete) file rm file 5 Remove the directory and its contents recursively rm -r directory 6 Force removal of file without prompting …
Cloud
In Linux, every file and folder belongs to a user and a group. In this blog post, we will discuss three different ways to find the owner of a file or folder in Linux. Let’s get started! The following Linux commands can be used to find file owner. ls -l howtouselinux # file owner is …
In Linux, deleting a file is a pretty simple process. However, there are a few things you need to know in order to delete files safely and securely. In this blog post, we will discuss 2 ways to delete files in Linux – using rm command and unlink command. We will cover everything from using …
If you’ve ever worked with ssh, you know that it can be a bit of a pain to configure. There are so many options and parameters! One way to make working with ssh a bit easier is by using an ssh config file. In this blog post, we will discuss what ssh config files are, …
Security has reached a tipping point for the IT industry. If you’re looking for an alternative to passwords, key-based authentication in SSH might be the right solution for you. This type of authentication uses a public and private key pair to verify your identity, and it’s much more secure than a password. In this blog …
The SSH authorized_keys file is a file that contains a list of public keys that are authorized to log in to the server. This file is used to prevent unauthorized users from connecting to the SSH server. The primary purpose of this guide is to illustrate the use of the ~/.ssh/authorized_keys file. After reading …
How to check Linux version is a commonly asked question during a Linux job interview. The OS version of a Linux distribution can be determined by using the command-line interface as well as a graphical user interface. In Linux, CLI is preferred over GUI as it provides more control over the OS. In this article, …
The OS version of a Linux distribution can be determined by using the command-line interface as well as a graphical user interface. In Linux, CLI is preferred over GUI as it provides more control over the OS. In this article, we will mostly focus on the command line methods which can be used to check …
Connection Reset by peer means the remote side is terminating the session. This error is generated when the OS receives notification of TCP Reset (RST) from the remote peer. Understanding Connection Reset by peer Connection reset by peer means the TCP stream was abnormally closed from the other end. A TCP RST was received and …
kubectl exec is a command-line tool for executing Kubernetes cluster commands. This article covers the kubectl exec syntax, the command actions, and frequent examples. when to use kubectl exec command Kubernetes is a container orchestrator that lets us automate deployments across multiple physical machines. Starting a shell session to a container in a Kubernetes cluster …