How to Step Into, Step-over, and Step-out With GDB?
To step into, step over, and step out with GDB, use the “step”, “next”, and “finish” commands. These GDB commands quickly identify and fix bugs in the program.
To step into, step over, and step out with GDB, use the “step”, “next”, and “finish” commands. These GDB commands quickly identify and fix bugs in the program.
To install and run the TFTP server, execute the “sudo apt install tftpd-hpa” command and configure the “tftpd-hpa” configuration file.
Linux and its distributions offer the pre-installed “id”, “echo”, “lslogin”, and “getent” command line utilities for finding user ID from the terminal.
To give full permission to a folder and its subfolders, use the “chmod 777
To reduce the file size of the scanned PDF, use the command line utilities ghostscript (gs), and “ps2pdf” or utilize the PDF online compression tool.
The binary files in Linux are analyzed through the file, ldd, hexdump, strings, readelf, objdump, strace, ltrace, and xxd utilities.
To force a clock update using the NTP server, use the “ntpdate” command and “ntpd” service. They synchronize the time on the system with the time NTP server.
To find out which users are in a group within Linux, utilize the “groups”, “getent”, and “id -Gn” commands and the “/etc/group” file.
To reverse SSH tunneling connection, execute the “ssh -R
The difference between cp -r and cp -a is that cp -a preserves all file attributes, while cp -r only preserves the ownership and permissions of the files.
The “onworks” platform offers to run various operating systems on the browser. Read this post to check how it works for Linux.
The “remove”, “autoremove”, and “purge” functionalities of Linux OSs allow the user to get rid of the executables, dependencies, and configurations of Apache.
Compare OwnCloud vs NextCloud for self-hosted cloud storage. Learn about similarities and differences to make an informed choice.
Among the top-of-the-line distributions of Linux, Ubuntu, Manjaro, and Fedora are the most suitable for programming. Read this post for more details.
This article provides a thorough comparison of Ubuntu and OpenSUSE operating systems by highlighting their key features so you can make the right choice.
Linux offers the pre-installed “cp” and “rsync” commands to copy multiple specific files from source to destination. Read this article for more details.
In Linux, the easiest way to copy the SSH keys file to another machine is using the “ssh-copy-id” with the remote hostname.
To run the SSH server on a port other than 22 is possible by changing the port number in the “sshd_config” configuration file
To get the file created/creation time in Linux, use the “stat”, “debugfs”, “ls” commands, and “Properties” options in GUI.
The default LibreOffice look and feel can be customized to change its “User Interface”, “Toolbar Look”, “Menu Content”, “Icon Style” and “Theme and Colors”
While uninstalling docker, a few configuration files and components must be manually deleted through a series of commands which require execution one by one.
Sharing large videos takes a lot of time, so FFmpeg is used to manipulate videos, change resolutions, and trim so that the size is reduced.
To create a “.pem” file using the SCP, use the “ssh-keygen -f ~/.ssh/id_rsa -e -m pem” command. Then, upload or download a file or directory using SCP.
The Linux distributions that support the gnome-desktop environment come with the “System Monitor” tool as a task manager by default.
When a user exceeds the assigned disk quota, it causes “Disk Quota Exceeded,” which is fixed by freeing the disk space or getting more quota.
Compare the differences between Kubuntu and Ubuntu to choose the best Linux distribution for your needs. Read this article for more details.
Discover the difference between GDM3 & LightDM, two popular display managers for Linux OS based on different factors, and choose the best for your system.
Linux and its distributions offer the pre-installed “systemctl” and “service” command line tools to restart the “Samba” server instantly.
Explore the differences between KDE and Gnome, two popular desktop environments for Linux. Decide which one is right for you.
In Linux, the terminal and shell environment are colorized using the ANSI color code, lolcat utility, or use the “preferences” option of the terminal.
In Linux, “java” can be completely uninstalled using their default package managers followed by the associated “remove” and “purge” flags.
To forcefully use wget for a proxy server without modifying system files, set “http_proxy” and “https_proxy” variables with server address and port.
Linux and its distributions offer the “getent”, “groupmems”, “members”, and “libuser_lid” command line utilities for listing the group members of a group.
Linux offers the “crontab -l” command to get a list of all scheduled cron jobs. It displays jobs on the basis of monthly, weekly, daily, and hourly.
To display the “top” command result sorted by memory usage, run the “top” in the terminal and press the “Shift + M” from the keyboard to sort it.
To add any user to the existing group, use the “userrmod” command with the syntax “sudo usermod -a -G [Group Name] [User Name]”.
To execute the “sudo” command without a password append the “Sudoers” file by adding “username ALL=(ALL) NOPASSWD:ALL” password configuration.
To install dependencies automatically with the dpkg package manager, users can execute the “sudo apt install -f” command in the terminal.
To unzip the “.tgz” file in the Linux terminal, utilize the “tar”, and “gunzip”, commands. They required the zip file to have the “.tgz” extension.
To generate random strings in Linux, use the “Random Number Generator”, “OpenSSL library”, “UUID generator”, and “mktemp” commands.
The journalctl is the built-in utility to retrieve systemd logs with respect to time, service, boot-time, Kernel-related tasks, etc.
To use the OR condition in the grep command, specify the patterns separated with “\”, or use the Flags “E” or “e” in the given syntax.
To make the chown recursive, use the syntax “chown -R [Mode] [Directory/Path]” for changing the ownership, or “chown -R :[Gorup] [Directory/Path]” for the group.
In Linux, Hard Disk Drives partitions can be viewed using “fdisk”, “cfdisk”, “lsblk”, and “parted” command line utilities or the “Disks” application.
The reason for the error is that the source path is not specified. To fix this error, specify the source path and copy the file recursively.
The reasons for this error are, either the root password is not set or the password is being entered incorrectly. To fix this, change/set the root password.
To save the output of the terminal into a file, three methods are utilized which are Redirection Operator, tee utility, or script method.
In Linux, all the “.run” files can be installed by using the “chmod” command and the “Permissions” options to make them executable.
The “chmod +x” command modifies the file permissions and makes it executable. Also, make multiple files executables via the “chmod +x
To unzip a .gz file without removing the original gzipped file, users can utilize the “gunzip”, “zcat” and “gzip” commands.
To change the password on the root user and user account in Linux, execute the “sudo passwd root” and “sudo passwd
To set the date through the command line, utilize the “date”, “hwclock”, “timedatectl” and “ntpdate” commands by specifying the “YYYY-MM-DD hh:mm:ss” format.
The “export PATH=something:$PATH” command changes the “PATH” environment variable of the current system by specifying the path in the “something” variable.
To find all large files in the root filesystem, you can utilize the “find”, “du”, and “ncdu” commands. Also, you can specify the size limit, and sorting order.
To see the full log from systemctl status services, execute the “systemctl status service_name -l” command in the system.
To find the last login on Linux, use the “last”, “lastlog”, “/var/log/auth.log”, “who” and “lastb” commands that display username, terminal, date, and time.
To install the “tar.gz” files using sudo, extract the files, configure the binaries, then compile them, and lastly install the executable using sudo in Linux.
Create the docker group (if it does not exist), add the particular user to the docker group, and then restart your computer to apply the changes.
The TTY is a character-based device used as a medium for entering data, still a crucial part of the operating systems but in software form.
Load average is the measure to determine the processes running or waiting to be run on the CPU. Three different methods can find the load average.
Linux and its distributions come with a pre-installed “tar” command to create tar, untar and view the tar file content. Read this guide for more details.
To find and change the MAC address, the ifconfig command, ip command, and “/sys/class/net/*/address” file are used in the system.
The Xmax scan can be performed using the nmap command in the system. This scan displays the status of the ports of the target machine.
In Linux, use the “history” and “wipe” command line tools to delete the system history without a trace. Both of them completely wiped out the system’s history.
To cut the video with the “ffmpeg” tool, use the “ss” flag for the starting point and the “t” flag for specifying the ending point. For cropping, see the guide.
In Linux, to close the Vi – Vim / Vi editor, enter the “:q”; to save the file, type the “:w” and exit the editor without saving using “:q!” commands.
To use the gedit (GNOME Text Editor) command in Linux, open the terminal and type gedit with options and file name to edit the files.
Linux, the “ls (list)”, “find”, and “du(disk usage)” commands can be used to find large files. These commands also contain important supported options.
In Linux, create the backup of the MySQL databases and restore them by utilizing the built-in “mysqldump” command line tool.
The “/dev/null” is a powerful tool in Linux that allows users to discard unwanted data, suppress error messages, make files disappear, and many more.