CLI

Command Line Basics

BASH Configuration

In this article, we explain which scripts are run to configure BASH and what sort of stuff you can put in those scripts to customise your shell.

Read More
5 min read

Command Line Basics

CLI - Getting Started

If you are new to using the command line, this is the place to find out about what it is, what you can do with it, and where best to begin learning about this powerful interface.

Read More
11 min read

Command Line Basics

Handy Bash Shortcuts

In this post, we'll show you some handy bash shortcuts. When you've become comfortable with using these (or at least some of them) your productivity at the bash shell will improve considerably!

Read More
8 min read

Command Line Basics

Introduction To BASH

Here we'll cover what BASH is, some basic BASH usage, and point you toward what you need to learn to configure BASH and customise the prompt.

Read More
9 min read

Command Line Basics

Linux File Permissions, chmod, & umask

Understand how Ubuntu / Linux file permissions and special mode bits work. Learn how to change these permissions using the chmod command. Find out how default permissions for new files are configured via a user's umask value.

Read More
13 min read

Command Line Basics

Netcat Basics

Netcat is a utility which allows us to perform a myriad of network related tasks such as data transfer and remote command execution over any TCP or UDP port. This post covers basic usage of the tool.

Read More
4 min read

Command Line Basics

Terminal Basics

This article is aimed at people new to Ubuntu and linux in general. It will give you some background info about what a terminal is (and what a shell is) and how to tweak your terminal's profile.

Read More
6 min read

Command Line Basics

User Account & Group Management Via Command Line

Learn how to manage user accounts and groups. We walk through how to add and delete users and groups (normal and system). Find out how to add/remove existing users to/from groups and how to create an admin account.

Read More
7 min read

Search and Find

A FAQ Style Introduction To Grep

The grep command is one of the best pattern matching tools available for Ubuntu and Linux users in general. This is a quick FAQ style flyby to show beginners some handy grep functionality.

Read More
5 min read

Search and Find

An Intermediate Look At The Find Utility

Use the find command to locate files on your box that were accessed or modified recently, or to find files based on size or owner.

Read More
5 min read

Search and Find

Find Files Based On Their Permissions

In this post we'll show you how to use the Ubuntu/Linux find command to locate files on your system based on file permissions.

Read More
4 min read

Search and Find

Getting Started With The "Find" Utility

This is the first of several posts about the "find" command line utility. Below, we'll introduce some basic practical usage to help get you started with using this handy piece of software without getting in too deep.

Read More
6 min read

Search and Find

Performing Actions On Search Results With The Find Command

Learn how the Ubuntu/Linux find command can perform actions on each result returned from a search. We'll cover actions carried out by find (itself), and combining find with external programs to help you get productive.

Read More
9 min read

encryption

Easy File Encryption Using OpenSSL

If you're new to encryption or simply want to encrypt a file but don't want to bother setting up a public/private key pair (required by some tools), then these simple examples of using OpenSSL could be what your looking for.

Read More
3 min read

encryption

Encrypted Data Transfer Using Cryptcat

If you like Netcat but don't want to use it because it offers no encryption you should take a look at Cryptcat, It allows the functionality of netcat, but uses twofish encryption to encrypt the data. In this post, we explain how to use Cryptcat

Read More
2 min read

encryption

GPG Encryption Guide - Part 1

Learn how to use military-grade encryption using GPG. This is the first in a series of guides that will teach you about using gpg for both symmetric and asymmetric encryption.

Read More
12 min read

encryption

GPG Encryption Guide - Part 2 (Asymmetric Encryption)

This is the next post in our series of GPG guides. Here, we cover asymmetric encryption and decryption of data using the gpg command.

Read More
3 min read

encryption

GPG Encryption Guide - Part 3 (Digital Signatures)

This GPG guide covers how to digitally sign data in various ways, explains the purpose of digital signatures, and shows how to verify them.

Read More
7 min read

encryption

GPG Encryption Guide - Part 4 (Symmetric Encryption)

This GPG guide covers how to use the gpg command for simple yet strong symmetric encryption using various different block cipher algorithms.

Read More
7 min read

monitoring

Identify Disk/Swap Hungry Processes with Iotop

If you need to find out what processes on your desktop or server are doing a lot of disk I/O (reads/writes) or swapping in and out of memory a lot, then take a look at iotop.

Read More
3 min read

monitoring

Monitoring Per Process Network Bandwidth Usage with NetHogs

Do you suspect that some process running on your box is using up a lot of network bandwidth? Would like to investigate and identify the culprit? If so, you need the nethogs utility.

Read More
3 min read

monitoring

Using ps to list processes - Advanced

The ps program can be used to identify problematic processes, for example you can use it to identify hung processes, cpu busy processes and memory hungry processes. We've already taken a quick look at some basic usage of the ps command. In this tutorial, we'll cover some advanced usage.

Read More
3 min read

monitoring

Using ps to list processes - Introduction

The ps program can be used to take a snapshot of processes on your system. This post shows you some basic usage.

Read More
2 min read

monitoring

Using Top to Monitor Processes

In this tutorial, we'll show you how to use top to monitor your processes in real time. Top gives an overview of what cpu and memory resources the processes on your system are using.

Read More
5 min read

security

Allow Multiple SSH Sessions Over an Existing Connection

Enabling SSH connection sharing allows you to reuse an existing ssh connection thus saving resources and removing the need to enter a password. Here, we'll run you through setting it up. We'll also mention a few pitfalls to watch out for.

Read More
2 min read

security

Installing SSH Daemon (sshd)

OpenSSH is at the top of the pile of utilities you can use for encrypted data transfer. Here, we'll cover how to install the server side daemon.

Read More
2 min read

security

Secure Encrypted Communications Using OpenSSH

OpenSSH is an implementation of SSH (secure shell) which is used for secure communication between two machines (a client and a server). OpenSSH is the best tool you can use for secure data transfer. Below, we'll run through how you can start using it for your data transfer needs.

Read More
3 min read

security

Secure File Transfer Using SFTP

In this post, we'll run through the commands that will allow you to use SFTP to securely transfer files from one machine to another using this interactive alternative to SCP.

Read More
4 min read

security

Securely Copy Files Remotely Using SCP

Secure copy (or scp as the program is called) is a program used to securely copy files between hosts on a network. In this post we cover the various use cases of scp.

Read More
3 min read

security

Using a Public/Private Key Pair For Auto SSH Login

In this post we cover how using a public/private key pair for SSH, you can enable automatic login to remote machines and (if you use a passphrase protected private key) you can improve the security of your communications.

Read More
4 min read

security

Using SSHFS To Securely Mount Remote File Systems

Securely mount remote file systems easily with sshfs. Edit remote files in your favourite GUI editor locally as if they were present on your own box.

Read More
3 min read

Basics

A FAQ Style Introduction to apt-get and apt-cache

Learn how to quickly install, update, remove, and search for software via the command line in this FAQ style introduction to the apt-get and apt-cache commands.

Read More
6 min read