The ‘df’ command is used to quickly print an overview of the disk space in use on different partitions and file systems.
df comes from the GNU Coreutils package and should be available by default in Unix/Linux based operating systems.
The GNU tape archive command, known as ‘tar’, is used to store many different files together into a single archive file. This makes it easy to perform backups and restores of files and directories in Unix/Linux based operating systems.
The practical examples in this guide will show you how to use the tar command in all sorts of different situations.
Wget is a non-interactive network downloader which can be used for downloading files in Unix/Linux. It supports the HTTP, HTTPS and FTP protocols and also has proxy support.
The wget command is quite powerful and has a lot of options available, in this guide we’ll be covering 20 of the most important wget examples that will help you learn how to best use it.
This guide will show you how to increase the security of an Invision Power Board (IPB) installation. We’ll walk through practical examples for you to follow to harden IPB, reducing your attack surface.
There are a lot of insecure default options which unless modified will put you at a higher risk of being compromised by an attacker. Here we will outline what should be modified to increase security of IPB.
Yellowdog Updater Modifier (yum) is an RPM based package manager which is used to install and update packages in various Linux distributions including CentOS, RHEL and Fedora.
Yum is quite powerful as it’s capable of automatically resolving dependency issues, and is similar to other package managers such as ‘apt-get’ in Debian based distributions.
These examples should serve as a useful introduction, guide or cheat sheet style resource for how to use the yum command in Linux.
The ‘history’ command available in Bash can be used to simply display your shell history, however there’s also a whole lot more that you can do with it, which we’ll demonstrate here.
Bash history allows us to quickly see what has been executed previously on a system, allowing you to hold users at least somewhat accountable for their actions (more on this later). It’s also useful if you’ve run something before and forgot the command, I can’t begin to tell you the number of times that I’ve done this!