#devops
Read more stories on Hashnode
Articles with this tag
Let's trace the event !!! · Linux log files are plain-text files that can be found in the /var/log directory and subdirectories. Linux logs exist for...
Password-protected choices can be difficult to remember and uncomfortable for users. You can be in a situation where you have to input your password...
Secure Shell - Remote Login · What is SSH? The Secure Shell Protocol (SSH) is a cryptographic network protocol that allows network services to be...
Find : In UNIX, the find command is a command-line programme for traversing a file hierarchy. It may be used to locate files and folders and then...
Sticky Bit When the sticky bit is set on a directory, only the file owner, directory owner, and root user can delete or rename its files. e.g. If a...
Linux is a multi-user operating system, it includes security to prevent users from viewing each other's private files. File permissions govern which...