Shell Scripts

View All

How to kill all user sessions using shell script in Linux?

System administrator task can be automated in various ways in Linux. It drastically reduces the human efforts and saves reasonable time which can be utilized for other productive tasks. shell …

Linux Commands

View All

How to Automatically Accept SSH Key Fingerprint?

SSH Secure Shell is an encryption network protocol that provides secure encrypted communications between two hosts. It allows you to connect to a remote machine securely over an insecure network. …

How to view images from Linux terminal

How to List and Remove a GPG Key in Ubuntu

Package Managers

View All

What is the difference between apt and apt-get command?

Most of us are often confused with the difference between apt and apt-get command. This confusion prevails among all the users, including beginners and experienced. These command line tools are …

Difference Between YUM and RPM

Latest Posts

8 Data Backup tips to avoid data loss

Data loss is one of those worst nightmares. if it comes true, it can lead to dire consequences. A lot of difficult situations may arise like legal ramifications; companies may …

What is the difference between apt and apt-get command?

Most of us are often confused with the difference between apt and apt-get command. This confusion prevails among all the users, including beginners and experienced. These command line tools are …

How to kill all user sessions using shell script in Linux?

System administrator task can be automated in various ways in Linux. It drastically reduces the human efforts and saves reasonable time which can be utilized for other productive tasks. shell …

How to get Battery status notification, when the battery is Full or Low?

Linux OS in Laptops are good for Nix users, but it often drains the battery. Have tried many Linux operating systems, but long battery life is not evident like Windows. …

How to Automatically Accept SSH Key Fingerprint?

SSH Secure Shell is an encryption network protocol that provides secure encrypted communications between two hosts. It allows you to connect to a remote machine securely over an insecure network. …