Preserve file permissions using -p option in cp command To preserve the file permissions when copying files or directories using the cp command, you can use the -p or –preserve option. The -p option will preserve the following attributes of the source file or directory: File mode (permissions) Access time Modification time User ID (UID) …
Linux
The error message “cp: Permission denied” typically occurs when the user doesn’t have permission to access the source file or the destination directory. Here are the errors we usually meet with “cp Permission denied” error in Linux: Error Description cp: cannot create regular file ‘destination/path’: Permission denied Indicates that the user does not have permission …
This article is part of the following series. 4 ways to list files within a rpm package in Linux 3 ways to Check RPM package dependency in Linux How to use yum to list All versions of Package in Linux 5 ways to list installed packages in Linux RPM packages can contain not only …
A connection timeout means that the client attempted to establish a network socket to the SSH server, but the server failed to respond within the timeout period. ssh: connect to host 203.0.113.0 port 22: Connection timed out In PuTTY, you might see an error window with text like this: Network error: Connection timed out In …
This article is part of the following series. 4 ways to list files within a rpm package in Linux 3 ways to Check RPM package dependency in Linux How to use yum to list All versions of Package in Linux 5 ways to list installed packages in Linux If you’re working with an RPM-based …
systemctl is a command-line utility in Linux operating systems that is used to control and manage the system’s services, daemons, and other processes. It is an essential tool for system administrators and developers as it allows them to monitor and control various system processes. Viewing systemd information In systemctl, a “unit” is a systemd …
FIPS is an acronym that stands for Federal Information Processing Standards. It is a set of standards and guidelines developed by the United States federal government to establish uniform requirements for information security, including computer security, data protection, and cryptography. What is FIPS? FIPS publications are used by federal agencies and organizations that handle sensitive …
Security-Enhanced Linux (SELinux) is a security architecture for Linux systems that allows administrators to have more control over who can access the system. It was originally developed by the United States National Security Agency (NSA) as a series of patches to the Linux kernel using Linux Security Modules (LSM). Security Enhanced Linux (SELinux) provides an …
The /etc/resolv.conf file is a configuration file used by the Linux operating system to store information about Domain Name System (DNS) servers. This file contains a list of DNS server addresses, as well as other options that control how DNS resolution works on your system. In this blog post, we will discuss the contents of …
In Linux, a repository is a collection of software packages that are available for installation on your system. Think of it as an app store for Linux systems. Repositories make it easier to find, install and update applications, without having to manually compile the source code. In this article, we’ll explain how to list the …