Tagged: root

0

“-bash: sudo: command not found” Error and Solution For Linux, Debian, CentOS

sudo  command is used to execute command as another user. This is generally used to run command as root. In some cases we can get an error like -bash:sudo:command not found which means sudo is not installed. In this tutorial we will look different ways and distributions to solve this problem. Install...

1

Linux Chroot Command Tutorial with Examples

Linux provides different mechanisms for practical and security reasons. chroot is one of them. Processes in linux can access to the file system or root by default. Linux kernel also provides chroot mechanism to restrict access to the whole filesystem in Linux. Syntax The chroot syntax is like below.

OPTION is chroot...

0

Linux Chown Command Tutorial with Examples To Change Ownership Of Files

chown command is used to change file and folders user , group and other ownership. chown is very useful tool but sometimes becomes very dangerous because it can harm current owner policy.chown mainly changes read , write and execute owner according to given user or group. Syntax Syntax of chown is like below.

List User and...

1

Linux Sudo Command Tutorial with Examples To Get Root Privileges

Linux sudo command is used to give root privileges to the normal users . /etc/sudoers file is used for configuration of sudo . Sudoers file provides the users who can run sudo command. Sudoers also used to limit the commands the user can run. Run Command With Sudo Sudo command will accept given command and...

0

Linux User Management

Linux operating system have users to operate applications, services and other stuff. Multiple users can be interact with Linux and we call it multi-user. It may be ridiculous but long time ago operating systems was single user. Which means to work on a system other users should sign out. Now...

0

How To Download and Install Kali Security and Penetration Test Linux Distribution?

Kali is a Linux distribution or it is a security and penetration test distribution. It is beyond a Linux distribution and provides a lot of useful, popular and featureful tools to the security professionals. Some of popular tools Kali provides nmap metasploit burp sqlmap masscan nikto … Download Kali We...

0

Linux Sshd Server Configuration and Security Options With Examples

Secure Shell or with its most know name SSH is a protocol developed to connect IT systems remotely and securely. SSH works as expected client server architecture. In this post we will look various security related configuration options of the SSH daemon service or sshd. The tutorial about the client side...

0

Linux Su Command Tutorial With Examples

The su short for substitute user command using to change currently logged user.  This makes things practical because the user change made without login. Su command can be used to get root privileges too. Su and sudo commands have different ways to act for similar aims. Syntax

Man Man page...

Enjoy this blog? Please spread the word :)