10 practical examples of tmux configuration with examples
By now if you have been reading this tutorial, you will realize that some of the Prefix key combinations with tmux are not user friendly. ...
By now if you have been reading this tutorial, you will realize that some of the Prefix key combinations with tmux are not user friendly. ...
In this tutorial I will give a detailed overview on different tmux commands with examples and screenshots form my Linux server terminal. if you don't ...
In this tutorial I will share step by step instruction to install vlc player in CentOS 8 Linux. VLC is one of the most used ...
How to check if a normal user has sudo access? Is it possible to know if a user has sudo access using a script? The ...
In this tutorial guide I will give you an overview on dashed filename and it's usage with examples to create, open, read, access, find and ...
How to use tar --strip-components and zip --junk-paths to remove absolute path from the archive. Tar is an archiving utility which needs no introduction to Linux ...
YUM is a package manager used with Red Hat, CentOS and many other distributions. Now the world is moving towards DNF which has lot more ...
In this article I will share the steps to install GNMOE desktop to enable GUI mode in RHEL/CentOS 8 Linux. There are different GUI Desktop ...
The other day while trying to recover my LVM2 volume, I was doing some POC work and while using lvextend I encountered this error "New ...
Trying to install RHEL/CentOS 7/8 using a customized repository? Now this repository can be from a customized ISO or directory. We see this error "Error ...
If you are working with Linux environment, you must have once in your carrier ended up with this error "another app is currently holding the ...
In this article I will share example and sample systemd unit service file to run script with systemd right before shutdown in CentOS/RHEL 7/8 Linux. ...
Using this hash, we can compare the hash against a list of hashes already computed. If the has matches, we have seen the contents of this file before and so we can delete it. If the hash is new, we can record the entry and move onto calculating the hash of the next file until all files have been hashed.