The awk command is very handy when you need to filter the contents of a file, a pipe,or keyboard. It searches each line of input for patterns that you specify and when the pattern is matched, it performs an action.…
Category: Software
Explanation of Standard input-output in Unix and Linux
Once a command is run, a process is created. This process then opens three flows: stdin, called the standard input, where the process will read the input data. By default stdin refers to the keyboard; STDIN is identified by the…
How to automate ftp login and file transfer
As a Linux/Unix server administrator I ran into an occasion where I had to automate the file transfer via ftp to a remote server. I had to create a shell script to automatically login to the remote ftp server and…
Auditing the cron jobs scheduled on the Unix or Linux server.
I have recently taken ownership of a Solaris 5.9 server and am in the process of migrating the applications over to a recent release. I decided to audit the applications and configuration of all the apps installed. One of the…
How to backup and compress a folder in one step, using tar and gzip.
If disk space is limited on your Linux or Unix server and you wish to backup a folder or file that is larger than the available free space. Then creating a compressed archive in one step may be the only…
How to change Red Hat Linux to boot to command line mode from Gnome.
Changing the default runlevel of the Red Hat Linux server can switch the bootup from Gnome to command line mode. You can make the changes consitent by editing the /etc/inittab file. Change the line id:5:initdefault: to id:3:initdefault: The number 5…
Gnome desktop will not start via the Red hat Linux server console.
I received an error when loggin onto the Gnome desktop via the server console. The server is running Red Hat Enterprise Linux ver 4. Iām able to logon to the server via the command line without any issue. All services…
How to install and initialize telnet on Red Hat Enterprise Linux or Fedora Core Linux.
Telnet is a very old communication protocol, it is not secure because the password authentication is transmitted in clear text. SSH is a secure protocol and is the replacement for telnet. Red Hat recommends that you use SSH to connect…
How to create a new logical volume in Red Hat Enterprise 5 Linux.
(1) Click on System ā Administration ā Logical Volume Manager. (2) Expand Uninitilized Entities on the left window by clicking on the arrow next to it. You will now see the available physical disk partitions if there is any. For…
How to change the shell in Linux or Unix.
Linux and Unix have a vairety of shells. A shell is a program that provides the text interface, it reads the interactive or non interactive commands, interprets and executes the instructions. Depending on your version of Linux or Unix, a…