Nc Command in Linux: Tool to Debug Network Issues

The “nc” command is often referred to as “Netcat”. It is a flexible yet robust tool often used in the Linux and other Unix based OS environments. It is a powerful utility to read from and write to network connections using either UDP or TCP. If you are a professional like network administrator, system administrator, or security professional, this … [Read more...]

SFTP Port Number: Understanding Basics of Secure File Transfer

SFTP is otherwise known as Secure File Transfer Protocol. It is a network protocol that allows secure file moving advantage over a network. The main difference between FTP (File Transfer Protocol) and SFTP is that FTP sends data in plain text. The secure file transfer protocol on the other hand, encrypts the data that is being transferred. This … [Read more...]

Untar tar.gz file: The Only How-to Guide You Will Need

If you are someone who works with so many files (especially compressed files), you will come across the tar.gz format very often. This format is the industry favorite because it combines both the “.tar” archive and the “.gz” compression. Combining these both powerhouses gives you an efficient way to bundle and then compress files. Now that we know … [Read more...]

Linux: Set Environment Variables—An explanatory guide

In Linux, set environment variables to define system behaviour. Ensure that all applications work as they are intended to. Environment variables in Linux are used to keep configuration settings such as user preferences and file paths. They are important for the optimal functioning of programs and scripts. In this detailed guide, you will learn in … [Read more...]

Ubuntu: Enable SSH with this clear and concise guide

In Ubuntu, enable SSH to securely manage and access your servers and network devices remotely. SSH is short for Secure Shell. SSH is important for System Administrators, network administrators, and developers to manage remote systems securely and efficiently. What is SSH in Linux? SSH or Secure Shell is a cryptographic network protocol. SSH … [Read more...]

Install Pip Ubuntu: A Detailed Guide to Cover Every Step

Pip is very important for managing packages and dependencies, if you are working with Python on a device running Ubuntu. Wherever possible, at Unixmen we also share how a command got its name. Pip is short for “Pip Installs Packages”. Pip is a package management system that is used to install and manage software packages written in Python. In this … [Read more...]

How to Fix the Error: kex_exchange_identification: read: connection reset by peer

SSH (Secure Shell) can be very unforgiving and throw up a plethora of errors for the slightest errors. One of the errors you might have encountered is the “kex_exchange_identification: read: connection reset by peer” error message. When you are in a hurry to establish a secure connection or a session, seeing this error can be very frustrating. In … [Read more...]

Bash: Concatenate Strings Easily with Our Simple Guide

As we have iterated countless times in our previous Bash guides, Bash is a very powerful shell used in a lot of Unix based systems like Linux and macOS. One of the common Bash scripting tasks is string manipulation, including and particularly concatenating strings in Bash. In Bash, concatenate strings to make your text processing … [Read more...]

Waybar: An All-round Status Bar for most Window Managers

Linux users prefer status bars to have a quick look on key details like battery status and more. Waybar is a customizable status bar with options to customize as per the user’s needs. With a lot of in-built configuration options pre-loaded, Waybar is an easy choice for Linux users who prefer tailoring their status bars to suit their requirements. … [Read more...]

Vim Find and Replace: A Complete Guide to Mastery

Vim, a powerful text editor, is a helpful tool in the Linux world with countless functionalities for text processing and manipulation. Two of its most useful functions are the finding and replacing commands. These commands boost the efficiency of users when they work on documents that contain lots of data. In this article, let us first learn how to … [Read more...]

AWK Command in Linux: A Detailed Guide

Creators Aho, Weinberger, and Kernighan gave the Unix and Linux community a wonderful and powerful text-processing language. The AWK commands can be used either to simply scan a text pattern and also to process text. In real world conditions, AWK command can empower your scripting skills to master manipulation and analysis of text files. In this … [Read more...]

Tar Command in Linux: A Step-by-step Guide to Mastery

At Unixmen, we have been explaining each and every important Linux command in detail that would help the Linux community abundantly and one such crucial command is the tar command in Linux. Tar is short for “tape archive”. This command is used to create, maintain, modify, and extract all files in a Linux device that are archived in the tar format. … [Read more...]

TCPDump Examples: How Does TCPDump Help You?

TCPDump is an essential tool for security professionals, system administrators, and network administrators. It provides capabilities to capture and analyze network traffic. Here are the most common reasons why TCPDump is useful: Troubleshoot networks: TCPDump allows network administrators to capture network packets, which can be analyzed to … [Read more...]

Bash Sleep: Time Your Delays with Bash

A Quick Introduction The “sleep” command in bash scripting pauses the execution of a script for a specified amount of time. The primary use of the sleep command is to introduce delays between commands or tasks, and also to control the timing and sequence of operations. The syntax to invoke bash sleep command is simple: sleep . The number … [Read more...]

grep RegEx – Master searching in Linux with this complete guide

The grep command is a fairly simple command when used alone. But when it is used with regular expressions (RegEx), the grep command becomes a very powerful and useful tool for searching for key strings in Linux. Irrespective of the environment, understanding grep and RegEx will help you navigate files and directories. In this extensive guide, … [Read more...]

Add User to Sudoers File: A Step-by-step Guide

A Quick Introduction Before we learn how to add user to sudoers file, let us learn why it is important, the prerequisites, and the best practices as well. One of the many advantages of using Linux is the extensive RBAC (role based access control) capabilities. With different user roles and permissions, system security and multi-user … [Read more...]