Peek Into NFS Mount Options
Quickly discover what options your NFS client actually uses and why it matters.
Quickly discover what options your NFS client actually uses and why it matters.
Control what gets copied with rsync by excluding files and folders using patterns and lists.
Efficiently copy, sync and snapshot directory trees locally or over the network with rsync.
A hands-on walk-through to create an archive, remove originals, restore files and verify integrity using tar.
Step through mdadm commands to inspect, assemble and mount a manual RAID recovery.
Practical commands and checks to watch Linux mdadm rebuilds in real time
Practical steps to inspect and troubleshoot Linux software RAID using mdadm.
Quickly locate AppArmor DENIED messages and turn them into actionable profile fixes.
Unload or switch a single AppArmor profile without disabling the whole LINUX security layer.
Quick commands to list which AppArmor profiles are loaded and whether they enforce or complain.
Find every file that injects environment variables into a systemd service and inspect what actually reaches the process
Change the kernel governor to favor battery life or raw speed, right from the shell.
Quick commands to read available and active CPU governors and understand how they affect performance and power.
Learn to inspect and switch Linux I/O schedulers for better disk performance and predictable latency.
Quickly read and adjust the block device scheduler to optimize I/O behavior.
Practical steps to read and monitor HDD and SSD temperatures with hddtemp, from one-off checks to daemonized monitoring.
Quickly find per-process and system file descriptor limits and stop "Too many open files" from breaking services.
Quick, practical ways to see which shared libraries an executable or a running process has loaded.
Discover which process keeps files or sockets open and act on them quickly.
Verify your OpenSSH daemon configuration quickly before restarting, to avoid lockouts and downtime.
Set a system-wide keyboard layout once and keep it across boots, consoles and graphical sessions.
Quick commands to reveal and verify the system locale and how it affects programs.
Quick, reliable conversions between character encodings on the command line.
Quick, practical checks to see if your system's timezone database is up to date and why that matters.
Learn how to use the `flock` tool to serialize access to files and critical sections from shell scripts.
Practical steps to constrain process memory on Linux using cgroup v2 and v1 tools.
Control how the kernel divides CPU time between groups of processes using cgroups so one workload cannot starve another.
Quickly find which processes live in which cgroup and verify resource containment.
Hands-on steps to create, limit and read cgroup resource metrics so you can watch a process under control.
Quickly verify that the kernel exposes a unified cgroup v2 mount, find available controllers and map processes into the hierarchy.
See how to read per-zone information to find fragmentation, low watermarks and reclaim candidates.
Quickly discover kernel-supported and module-backed filesystems on your system.
Quick methods to read what features your running kernel was built with.
Quickly identify which kernel driver and firmware your network interface uses and why that matters.
Enable network wake-ups from Linux and control remote power with simple commands.
Inspect and set NIC hardware parameters quickly from the shell to improve reliability and performance.
Quickly verify what speed and duplex your interface negotiated and act on mismatches.
Diagnose dropped packets and buffer pressure with practical commands and direct examples.
Capture and inspect network traffic instantly from the shell using tshark.
Quick, precise packet captures that show only DNS activity so you can spot resolution problems fast.
Print human-friendly timestamps and inter-packet deltas with tcpdump, and see exact examples to reproduce.
Capture only the traffic you care about by filtering on ports with tcpdump, and speed up diagnosis.
Capture, filter and inspect packets on Linux from the terminal to find what the network is really doing.
Quickly inspect per-interface packet and byte counters to spot errors, drops and traffic trends with a single command.
Stop predictable IPv6 addresses from following your host across networks by enabling temporary addresses.
Quickly locate how Linux decides where IPv6 packets go and verify the next hop on the command line.
Learn to compute IPv4 subnet masks by hand and verify results with simple Linux tools.
Quickly discover hop-by-hop routes and path MTU without root privileges.
Learn to spot where packets vanish on Linux using simple tools and clear commands.
Map a MAC to a predictable IP with concrete isc-dhcp-server and dnsmasq examples to follow.
When a host key is duplicated or suspected compromised, replace it quickly and safely to restore trust.
See live inode statistics and discover when metadata, not bytes, is the bottleneck.
Inspect and adjust ext2/3/4 superblock settings for reliability and performance.
Find and inspect the blocks reserved for root that keep a filesystem usable when it is nearly full.
Use smartctl to run a SMART long self-test and inspect the results to detect disk media problems.
Inspect and run SMART checks from the shell to spot failing disks before data loss.
Swap the virtual console font for the current session with a single command and see the result immediately.
Find, peek and test the keymaps your Linux system can load, both for consoles and X.
Configure system and user fonts, rebuild the font cache, and get consistent rendering on X11, Wayland and the console.
Quickly discover which locales are installed and which one the system actually uses.
Safely reproduce and observe a fork bomb inside a controlled container and learn how to limit and mitigate its effects.
Quickly inspect numeric and named user and group identities from the shell.
Control which files bash reads at login to make environment, PATH and aliases persistent.
Make new files start with predictable permissions by setting a global umask for logins and services.
Inject messages into the system log quickly for testing, monitoring and script annotations.
Turn the binary systemd journal into portable files for forensic analysis, backups and secure transfer.
Find when journald is dropping messages, see why, and tune the limits with a few commands.
Enable and tune persistent systemd journals so logs survive reboots and disk pressure.
Hands-on commands to detect, verify and enable persistent systemd journal storage.
Enable and configure chronyd to keep system time accurate even on flaky networks.
Learn to inspect, correct and synchronize system time reliably using timedatectl and related tools.
Quick methods to inspect and measure clock drift with built-in Linux tools.
How to force an immediate time correction from the command line on Linux.
See how Linux stores user account records and learn quick commands to inspect the format.
How to audit, convert and control shadowed passwords for secure local authentication.
Quickly reveal which groups a user belongs to using the simple "groups" command.
Quickly become a different group in your shell to create or access group-owned resources.
Make world-writable directories safe by limiting who can remove or rename files.
Practical job control for managing tasks started from your shell.
Rapid commands to detect defunct "Z" processes and act on them.
Quickly find and inspect the kernel threads running on your system using standard tools and /proc.
Practical, hands-on ways to control how long files live in /tmp so services stay reliable.
Practical command-line techniques to find which home folders and files consume your disk space.
Mirror kernel printk to a chosen virtual console and control what you see.
Hands on checks to prove your syslog is receiving, storing and forwarding logs.
Use journalctl, dmesg and systemctl to find what failed during boot and why.
Send a signal to a whole process group from the shell to stop related workers at once.
Quickly locate process IDs by name to inspect, signal, or troubleshoot services using the pidof utility.
Measure which process consumes CPU and act fast on performance issues.
Quickly change the niceness of running processes to manage CPU access and responsiveness.
Quickly find and interpret process "nice" values, then adjust priorities safely on a Linux host.
Learn to watch Linux interrupt counters, spot noisy devices and rebalance IRQs before they throttle your system.
Hands-on steps to reserve, mount and use Linux hugepages for low-latency workloads
Quickly find how hugepages are configured, why they matter, and how to read the kernel state.
Peek into a program's address space by reading the kernel's /proc maps file and learn to interpret what you see.
Learn how to read CPU temperatures on Linux and act before heat becomes a problem.
Learn how to stop unwanted kernel modules from loading, with hands-on commands and persistent configuration.
Let the system pull required kernel modules and their dependencies automatically.
Quickly inspect which kernel modules are loaded and why they matter for systems and troubleshooting.
Enable, restrict and persist the kernel's magic SysRq so a stuck system can be steered from keyboard or scripts.
Manage virtual terminals, switch sessions, and inspect who is logged in on Linux.
Turn a regular file into a block device to mount, format or encrypt it and learn exact commands to do it safely.
Run quick, repeatable IO benchmarks to quantify filesystem performance with fio and learn how to interpret the results.
Identify files by their magic numbers using the file command.
Quickly inspect and extract .tar.xz archives using tar and xz tools, safely and efficiently.
Keep archives compact and confidential by combining tar with modern encryption tools for safe transport and storage.
Find which tmpfs instances are active, inspect their options and size, and act on them from the shell.
Harden login security by automatically locking accounts after repeated authentication failures.
Configure PAM to enforce strong, system-wide password rules and reject weak credentials at the point of change.
Practice triggering and tracing PAM authentication decisions to find failures fast.
Learn to read, test and reason about the files under /etc/pam.d so you can diagnose authentication behavior quickly.
Learn to set, change and remove account expiry dates from the command line to control temporary access quickly.
Quickly spot and manage failed login attempts using the faillog utility to detect locked accounts and brute-force activity.
Learn how to notify users, send polite signals, and escalate to forced termination without risking data loss.
Quickly discover who is logged in, from where, and what they are doing using simple command-line tools.
Create, inspect and extract compressed archives quickly on the command line.
Learn how to change Unix file and directory permissions quickly and safely with practical commands.
Quickly produce and check MD5 checksums on the command line to verify file integrity.
Practical steps to generate, deploy and remove SSH keys so access stays secure and manageable.
Hands-on steps to find why users cannot authenticate and how to act.
Quickly produce and verify SSH key fingerprints to ensure host authenticity and key integrity.
Control default file permissions per user to protect data and workflows.
Quickly discover the mask that shapes new file and directory permissions.
Hands-on commands to verify and troubleshoot IPv6 reachability from the shell.
Quick, reversible steps to turn off IPv6 at runtime for diagnostics and compatibility checks.
Turn on IPv6, verify addressing, and configure kernel and network tools so your Linux host speaks the modern Internet protocol.
Use telnet as a quick raw TCP probe to verify service reachability and exchange minimal protocol data.
Quickly discover which login shells a user has and whether those shells impose restrictions.
Find defunct processes fast and learn how to make the parent reap them.
Spot processes adopted by PID 1 and reclaim control of stray jobs quickly.
Practical steps to mount tmpfs with the right options to balance speed and security.
Locate and interpret authentication entries in system logs to spot failed logins and suspicious access.
Quickly list and inspect shell resource limits to troubleshoot and tune processes.
Edit the systemwide bash startup file to set aliases, environment and behavior for every interactive shell.
Set system-wide environment variables for all login shells with a single file.
Do quick, accurate arithmetic directly in the terminal with the bc calculator.
Make newly installed shared libraries visible to the runtime linker without rebooting.
Use ldconfig to inspect and refresh the shared library search paths that the dynamic linker uses.
Quickly reveal which shared libraries a program needs and find missing dependencies before they stop you.
Trace what a program asks the kernel to do and find bugs, permission problems or surprises.
Prevent a single account from spawning runaway processes with a quick shell limit.
Create a FIFO with `mkfifo` and let processes exchange data through a filesystem entry.
Use the wc command to count words, lines, bytes and characters on the command line and get fast file statistics.
Use the simple `seq` generator to run commands repeatedly without writing long loops.
Quickly measure how long a command runs and interpret real, user and sys times.
Quickly combine columns from multiple text files on the command line and reshape data with simple options.
Learn to slice big files into manageable parts using the split command
Efficiently build file lists with find and execute commands in bulk with xargs.
Search text inside files quickly from the command line and turn patterns into action.
Fast command-line recipes to locate the files that steal your disk space.
Quickly discover which mount options are currently active on a system and why they matter.
Access ISO files like normal filesystems without burning media.
Hands-on steps to restore GRUB or EFI boot entries using a live system and minimal tools.
Hands-on raw disk I/O measurements with the dd tool to get a quick view of write and read performance.
A practical guide to set and use filesystem labels so volumes are easy to identify and mount.
Quickly locate the UUIDs that tie disks to mounts and make system boots predictable.
Quick, practical ways to read laptop battery status from the Linux command line.
Read the system’s DMI/SMBIOS tables to discover hardware details quickly.
Swap cron for systemd timers to schedule tasks with tighter integration, logging and dependency control.
Inspect system timers, verify clock sources and measure drift to troubleshoot missed or delayed jobs.
Learn how to list and remove scheduled at jobs from the command line.
Inspect and manage one-time "at" scheduled jobs from the shell.
Schedule single-run commands fast from the shell.
Validate and preview cron timing with quick CLI checks and a tiny parser to avoid scheduling surprises.
Keep growing log files in check by rotating, compressing and pruning them automatically.
Learn to route, drop, and rewrite messages with rsyslog filters for clearer log management.
Practical commands and checks to read, test and troubleshoot the logs rsyslog writes.
Change boot settings, kernel options or timeout and then regenerate GRUB2 configuration safely.
Learn how to set and regenerate GRUB timeout so machines boot predictably and quickly.
Learn how to locate and verify bootloader settings so the correct kernel and options are used at boot.
Practical steps to edit and regenerate the Linux initramfs for boots, encryption and rescue scenarios.
Recreate the early userspace image to recover boots and include new drivers quickly.
Quickly read what the kernel received at boot and diagnose boot issues.
Quickly inspect current CPU frequencies, governors and scaling behavior from the command line.
Quickly visualise parent-child relationships of running processes with pstree.
Use the watch utility to rerun and observe command output so he can spot changes live.
Hands-on steps to set, verify and persist the default route so outbound traffic reaches the right gateway.
Remove stale Ethernet-to-IP mappings to restore connectivity or test neighbor discovery.
Quickly inspect and manage the ARP cache to diagnose local network reachability and identify MAC addresses.
Quickly inspect and understand the kernel routing table using the classic Linux `route` command.
Bind names to IPs so hostnames resolve reliably across boots and network changes.
Quickly locate latency and packet loss along a route using a single interactive command-line tool.
Learn to inspect sockets and verify connectivity quickly using the `ss` utility on Linux.
Keep package sources authentic by configuring repository GPG keys and signing verification for apt repositories.
Quickly turn foreign binary packages into Debian-format packages to test or install them on Debian-based systems.
Learn to inspect and extract files from RPM packages without installing them.
Learn to inspect installed RPM packages with practical commands and examples.
Choose which repository or version apt should prefer and stop unwanted upgrades or downgrades.
Learn how to reveal what a package needs before you install it and avoid surprises.
Refresh the system's view of available packages so installations and upgrades know what is current.
Set a persistent system name so the machine keeps a stable identity across boots and services.
Quickly locate listening sockets and the processes that own them to troubleshoot services and ports.
Run a few simple cat commands to observe kernel entropy, blocking behavior and where randomness comes from.
Find the folders that eat your disk with a fast, interactive terminal browser.
Quickly check how long a Linux host has been running and how busy it is.
Quickly find and stop processes by name using the pkill command.
Quickly find which shell processes are running on a Linux host and inspect how they were started.
Quickly change and persist virtual-console keyboard mappings.
Create unique, race-free temporary files and directories for scripts and tools.
Edit your bashrc to add, reorder or fix the PATH so personal tools run without typing full paths.
See which environment variables your shell exports and how they influence processes.
Use the simple `pmap` snapshot to spot which memory segments grow and find leaks fast.
See appended log lines instantly from the shell and debug in real time.
Quick methods to discover which shells are present and which shells users actually have assigned.
Switch a user's login shell safely and immediately, with commands and checks you can run right now.
Hands-on steps to compile, enable and manage locale definitions on Linux using localedef and locale-gen.
Quick checks and fixes to ensure the system uses the correct language and character encoding.
Display a command's output on the screen while saving it to a file, and learn practical tricks to split streams.
Learn how to shape the bash prompt so it becomes a practical source of context and reduces mistakes.
Practical steps to remove command history from your shell while understanding the limits of secure deletion.
See, recall and reuse past commands quickly with the shell builtin history.
Quickly discover who is logged in and what he is doing, using small, reliable commands.
See which connections use your bandwidth in real time with a compact, command-line viewer.
Learn how to grow and shrink filesystems without losing data and how to avoid common pitfalls.
Change or convert filesystem labels safely across ext4, xfs, btrfs, vfat and ntfs using concrete commands.
Use parted to inspect disk labels, partitions and free space quickly and safely.
Hands-on shell recipe to add swap space quickly and safely on a Linux host.
Turn a spare partition into usable swap in minutes and avoid out-of-memory troubles.
Quickly discover whether the filesystem is out of inodes and how to act before services fail.
Grant specific kernel privileges to binaries so they can do one job without running as root.
Quickly discover which POSIX capabilities a binary carries and why that matters for system security.
Quickly change how SELinux treats services without rewriting policies.
Switch SELinux into permissive mode briefly to observe denials without blocking execution and speed up troubleshooting.
Quickly see which SELinux contexts files, processes and users carry and decide what to do next.
Map the root, learn where services, logs and users live, and gain confidence navigating any Linux host.
Control name-to-IP mapping on a single Linux host quickly and predictably.
Quickly inspect active and scheduled systemd timers from the command line and act on them.
Quickly check whether a file is locked against modification using `lsattr` and related tools.
Use low-level filesystem attributes to prevent modifications and deletions with a single command.
Decide who receives cron output by configuring MAILTO, silencing noisy jobs, or wiring cron to an MTA.
Learn where cron writes its messages and how to extract the lines that tell you what ran and why.
Practical steps to change when and how logrotate rotates your log files.
Practical ways to read rotated and compressed log files without breaking rotation.
Push in-memory journal entries to persistent storage with a quick journalctl command.
Quickly inspect and control how much disk space the systemd journal consumes, and reclaim space without breaking logging.
A hands-on guide to make scripts run at boot, even on systemd systems.
Set up safe, unattended package updates so systems stay secure with minimal hands-on time.
Use systemd's isolate to jump the system into another target quickly and safely.
Quickly broadcast text messages to every logged-in terminal to announce maintenance or urgent notices.
Plan and run timed halts and reboots from the command line with practical examples and safety tips.
Create, encrypt and transfer archives over SSH with practical, secure commands.
Learn how to create and manage compressed zip archives from the command line.
Learn how to compress and decompress files quickly on the command line using gzip.
Archive, compress and restore files with a single, reliable command.
Quick, practical steps to deny traffic from malicious IP ranges using iptables.
Practical steps to persist and recover firewall rules using iptables-save and iptables-restore.
A hands-on guide to write and apply basic iptables firewall rules that protect SSH and web services.
Turn a Linux host into a simple router by enabling kernel IP forwarding and try the commands yourself.
Turn the MOTD into a helpful, secure and dynamic login message.
Concrete actions and commands to make SSH access resilient against common attacks.
Allow or deny SSH logins per account using sshd configuration and related controls.
Generate, install and manage SSH key pairs to replace passwords for safer remote access.
Learn how to quickly and securely transfer files between machines using scp, the SSH-based copy tool.
Practical steps to probe ports and debug services using nc.
Inspect DNS records, reverse lookups and server-specific queries with the host command.
Run a few `dig` commands to verify name resolution, understand answers, and find where things break.
Learn to read and change Linux routing tables to steer packets where you need them.
Quickly add a runtime IP to an interface for testing, maintenance or one-off services.
Hands-on steps to bring interfaces and daemons back without guesswork.
List and inspect active TCP, UDP and UNIX sockets from the command line to troubleshoot and secure a Linux host.
See which processes are reading and writing the disk right now and hunt down bottlenecks.
Quickly inspect processor topology and capabilities from the command line using a single utility.
Quickly spot which disks are busy and measure request rates and latencies.
Read hardware IDs, find drivers and debug PCI devices from the shell.
Apply kernel parameter tweaks now and make them persistent across boots using the right files and commands.
Apply Linux kernel tunables at runtime for performance or security with practical examples
Inspect where time is spent during boot and act on concrete slow services.
Practical, command-line ways to list and inspect the daemons running on a Linux host.
Quick, practical commands to find how long a Linux host has been running and what the numbers mean.
Find failed systemd units fast and fix services with concrete commands.
Turn a script or program into a managed service that starts at boot and restarts on failure.
Make chosen services start automatically at boot by enabling their unit files with systemctl.
Learn to write, enable and troubleshoot systemd unit files so services behave predictably during boot and runtime.
Quickly inspect recent kernel messages to diagnose hardware and boot-time issues.
Practical, command-line ways to disable and re-enable Linux accounts for maintenance and security.
Quick commands to find the last system boot time and why it matters.
Quickly see who is logged in, where from, and how long sessions have been idle.
Enforce per-user resource caps at login to prevent resource exhaustion and keep systems stable.
Enforce password aging, warnings and account expiry using the chage command.
Quickly list successful and failed user logins to investigate access patterns and spot anomalies.
Create a second filename that points to the identical file data on disk without duplicating bytes.
Quickly reveal inode details, timestamps and permissions for any file using the stat utility.
Small commands, big time savings when inspecting files.
Learn to create and apply diff patches on the command line to update files reliably.
Quickly find and understand file differences from the shell.
Learn to sort lines alphabetically using the GNU sort command and related tools.
Practical text reshaping and data extraction at the shell prompt using awk.
Use sed to apply quick, repeatable edits directly to files from the shell.
Practical, hands-on tips to extract fields and fixed-width columns quickly with the cut command.
Quick, practical steps to extract, parse and investigate sudo events from syslog and the systemd journal.
Create persistent, safe aliases to shorten commands and speed up your shell workflow.
Quickly change your PATH for a session or a single command to test tools without permanent edits.
Quickly list and control the process environment to debug scripts and run programs with tailored variables.
Learn to map what a service needs and what needs it using systemctl and a few inspection tricks.
Learn practical, low-level package control to inspect, install, and remove .deb files directly on Debian-based systems.
How to detect and rebuild a corrupt RPM database quickly and safely from the command line.
Learn to install and verify RPM packages from local files, handle dependencies, and choose the right tool for the job.
Fetch RPMs from configured repositories without installing them, useful for offline systems and audits.
Search package metadata locally and inspect details with the apt-cache tool to find the right Debian/Ubuntu package quickly.
Quickly discover the running Linux kernel release with a single command.
Identify hung or runaway Linux processes and terminate them reliably using the kill command and signals.
Quickly move tasks between background and foreground to stay productive on the command line.
Make devices and network shares mount automatically and reliably at boot.
Discover when a filesystem has run out of inodes and how to diagnose it quickly with common command line tools.
Quickly inspect disks, partitions and mounts with a single, glanceable command.
Keep runaway programs in check by restricting what a shell and its child processes may consume.
Fast, practical commands to read SELinux mode and full status so you can act with confidence.
Use systemd's tmpfiles.d fragments to create, protect and clean transient files reliably across boots.
Use the uname command to reveal kernel, machine and OS bits in seconds.
Practical steps to check and repair Linux filesystems safely with fsck.
Create a byte-perfect backup of the first 512 bytes so you can restore a damaged boot sector quickly.
Configure autofs to mount file systems on access and free resources when idle.
Use a tiny, built-in tool to reveal CPU, memory and I/O pressure quickly.
Quickly identify listening services and active connections to diagnose and secure a Linux host.
Control NetworkManager connections from the shell to script, debug and automate interface tasks.
Learn how to keep log directories tidy by rotating, compressing and archiving logs with logrotate.
Keep folders identical and efficient by sending only differences with rsync.
Learn how to grant, restrict and audit sudo rights so users can perform administrative tasks without exposing the whole system.
Explore and control live system processes with a fast interactive viewer.
Learn a compact, hands-on approach to harden a Linux host using the Uncomplicated Firewall.
Quickly inspect whether a daemon runs and find the reason when it does not.
Learn how to open, edit and save files with vi and speed up command-line text work.
Learn how to set environment variables so they survive logins and reboots.
Hands-on steps to run, harden and maintain an SSH server and its keys.
Learn to set a static IPv4 address, verify connectivity, and make the change persistent on a Linux system.
Locate files precisely and act on them from the shell, fast and reliably.
Inspect RAM and swap quickly with the free command to spot memory bottlenecks in seconds.
Keep system clocks precise across servers and desktops by configuring reliable NTP synchronization.
Read the kernel's own boot diary to find hardware and driver issues fast.
Practical, step-by-step recovery of root access by booting into single-user mode.
Change the default systemd target that corresponds to classic runlevels and control default boot behavior.
Learn how to create, inspect and safely update symbolic links to manage files and deployments.
Practical, command-line and web-driven workflows for installing, inspecting and controlling printers with CUPS.
Learn to compute and verify SHA-256 checksums from the command line to ensure file integrity.
Hands-on control of kernel drivers and features using modprobe, insmod and friends to shape a running system.
Practical commands to list, inspect and manage loaded kernel modules on a running system.
Add, inspect and remove static routes from the shell to steer Linux traffic exactly where you need it.
Probe each hop between you and a destination to find where packets slow or stop.
Quick, hands-on inspection of connected PCI and USB devices and their drivers.
Learn to add, trust and control package sources so installations stay reliable and secure.
Learn to steer command output and errors into files, other programs, or combined streams to build reliable shell pipelines.
Harness the speed of grep to filter command output and files with precision.
Practical steps to configure system locale and timezone with systemd and common tools.
Control start stop and status of traditional init services quickly from the shell.
Change timeout, kernel flags and defaults to control how Linux boots.
Quick, pragmatic steps to find and fix common network faults using the ip suite and ping.
Learn to create and manage swap files and partitions from the shell to control memory pressure and system behavior.
Learn to pack and unpack files with tar on the command line and move archives around efficiently.
Apply precise per-user and per-group file permissions using setfacl for flexible access control.
Use journalctl to read, filter and follow the systemd journal and find answers in logs quickly.
Learn to snapshot processes with ps and inspect live activity with top to find and fix resource hogs.
Schedule scripts and maintenance jobs reliably using the cron daemon and crontab.
Practical steps to name your machine and make name resolution reliable on modern Linux systems.
Find what fills disks: `df` shows filesystem capacity, `du` exposes directory usage.
Create and remove Unix groups from the shell to shape access and permission boundaries.
Learn to start, stop, enable and inspect systemd services from the command line.
Master command-line package managers to install, update and remove software reliably on Linux.
Learn to bring up an interface, assign an address and make the configuration persistent using real commands.
Learn how to read and act on the files under /var/log to diagnose Linux problems quickly.
Learn how to attach and detach filesystems safely from the command line.
Quickly create filesystems on block devices using the mkfs family of tools.
Hands-on steps to plan and create partitions with fdisk and get disks ready for filesystems or OS installs
Change file and directory permissions quickly using octal or symbolic notation.
Master the chown command to assign files to the right user and group quickly.
Create, control and secure accounts from the shell with practical commands.
Hands-on steps to detect, mount and unmount a physical CD or an ISO image from the command line.
Learn how to locate, filter and understand running processes with the ps command to diagnose issues fast.
List all files, including hidden ones, and inspect permissions, sizes and timestamps with a single command.
Master `ls` to inspect directories fast and confidently.
Discover how the locate command finds files lightning-fast using a searchable database.
Master the `find` command to locate, filter and act on files across a filesystem — fast and safely.