The pv command allows you to see the progress of data through a pipeline. It provides the following info:
- Time elapsed
- Percentage completed (with progress bar)
- Current throughput rate
- Total data transferred
Disk cloning is nothing but the process of copying the contents of one hard disk (or partition) to another disk or to an “image” file. I make backup regularly using rsnapshot tool, but I also clone my hard disk once or twice a month. This option allows me to restore my OS and installed software quickly. Linux comes with various utilities for performing disk cloning. In this post, I’m going to list my favourite open source disk cloning softwares that has saved my butt multiple times.
Process identifier (PID) is a number used by Linux / Unix kernels (and Windows operating systems) to identify a process. Usually, new processes are created using the fork() system call. Each PID (or so called tasks) can be monitored under Linux. In this quick tutorial, I will explain how to use the pidstat command for monitoring individual tasks currently being managed by the Linux kernel.
Mozilla Firefox version 11.x+ has support for 3D view. It is a WebGL based website visualization tool that highlights page structure. You can see relationship between your code and the page output by stacking elements as they are nested in the DOM and lets you see elements that are hidden or off the page. You can zoom in and out, rotate and pan the view to see the page from any angle that is helpful to you. In this blog post I will explain how to enable 3D view on X11. Please note that the 3D view is not for your daily browsing needs. It is useful for finding out bugs such as nesting issues or even XSS vulnerabilities. Personally, I use 3D view as a tool to understand divs, spans, and other elements on the page.
Everything is a file under Linux and ls* and friends can help you to dig out more information from the system than you originally thought.
Using the same password on different servers allows attackers to access your accounts if cracker manage to steal your password from a less secure server. This is true for online website accounts too. So solution is to create unique passwords for server accounts like your email, sftp and ssh accounts. General guideline to create a strong and unique password is as follows:
The Linux kernel version 3.5 has been released and is now available for download. New features include support for hybrid graphics, security fixes, and other enhancements.
I just want to know how to run Linux commands as another user or as root user?
Confused About Linux commands.
Ever want to list all the Linux commands (including bash shell aliases and functions) you could run on the server / workstation? Look now further. Try compgen command.