Latest Columns
![Check the AlmaLinux or Rocky Linux version](https://linux.how2shout.com/wp-content/uploads/2024/07/Check-the-AlmaLinux-or-Rocky-Linux-version.webp)
Five commands to Check the AlmaLinux or Rocky Linux version
This tutorial explains how to check the current version of our Almalinux or Rocky server systems using the ...
This tutorial explains how to check the current version of our Almalinux or Rocky server systems using the ...
Unzipping and extracting Tar.gz files is routine work for a system administrator or developer, so we’ve created a tutorial on extracting Tar.gz files easily using the command line. What is a tar.gz File? A tar.gz file combines TAR (Tape Archive) and GZ (Gzip) compression. Both …
As its name suggests, Cherry-picking on GitHub is a valuable developer feature. It allows them to apply selective commits from one existing branch to another. The Cherry-pick technique is very beneficial when developers want to use a bug fix; some branches need a feature from …
TensorFlow is a powerful open-source library for machine learning and deep learning developed by Google. Researchers and developers widely use it to build and deploy machine learning models. This article will walk you through installing TensorFlow on an Ubuntu system. We will cover installation using …
Docker installation on Ubuntu 24.04 can be done by adding its official repository; however, there is another easy way, i.e., using the SNAP. Snap is a popular universal package manager that works on almost all Linux distros. It can be used to install Docker using …
Rootkit Hunter (Hunter) is an open-source but powerful tool for Linux systems such as Ubuntu 24.04 that scans for local exploits, backdoors, and rootkits. Therefore, it is an essential tool for server administrators, especially for maintaining system security by checking for common signs of malicious …
The top bar in Ubuntu shows system-related information such as internet connection, date and time, volume, and more. Ubuntu UI has a top bar feature; its default desktop environment is GNOME. Many Ubuntu users dislike the top bar in the UI and want to modify …
Managing users and groups is one of the significant tasks, but only root users (who have administrative privileges) can add a user to a group. Linux has two major types of groups: Primary Group: This group is the same as the username. When a user …
LinuxLinux is considered the most secure system, but this does not make it impervious to malware or other security breaches. The vast scale of Linux system use makes protection against potential threats significant. Antivirus software can bring an extra layer to your system, as it …
In Linux, a root password protects your system as it can give you full access to the root privileges. If you share your root password with anyone, your system can be at risk. That’s why you must carefully create and handle a strong root password. …