Close

Redhat

Applying ACLs to directories

Overview By the end of this article you should be able to answer the following questions: Using ACL on directories So far we have seen how to give a user/group special permissions for a particular file. However you can also give a user/group special permissions to a folder. This is […]

Read More

The ACL’s mask setting

Overview By the end of this article you should be able to answer the following questions: In the previous example we had: $ getfacl /tmp/testfile.txt getfacl: Removing leading ‘/’ from absolute path names # file: tmp/testfile.txt # owner: root # group: root user::rw- user:homer:rw- group::r– mask::rw- other::r– Here we have […]

Read More

The systemd emergency.target

Overview By the end of this article you should be able to answer the following questions: If you have problems booting up your machine, then you can boot into the emergency.target. In this target you can explore your filesystem for possible issues. In this filesystem, the root filesystem (/) has […]

Read More

Job Scheduling

There will be times when you will want to schedule some task to automatically occur in the future. There are 2 possible scenrario. Scenario 1 – In the first scenario you might want to run tasks periodically, e.g. once a month. In which case the best way to achieve is […]

Read More

The ss utility

Overview By the end of this article you should be able to answer the following questions: The ss utility is the successor to the netstat utility. It is a great tool for troubleshooting networking related issues. Here’s how to list all listening and established connections: $ ss -a As above, […]

Read More

Interactive shells and login shells

See also switching users using su Whenever a new user is created, by default, a set of (usually hidden) config files will get copied to the user’s new home folder. These files are actually duplicate of all the files contained in the /etc/skel directory: $ ls -la /etc/skel/ total 24 […]

Read More