dar is a full featured backup tool, aimed for disks (floppy, CD-R(W), DVD-R(W), zip, jazz, hard-disks, usb keys, etc.). The dar (“disk archiver”) command is intended to replace tar by offering more backup and archiving functionality. It is especially useful at creating full, differential, and incremental backups. If you encounter the below error while running […]
dar Command Examples in Linux
dar is a full-featured backup tool, aimed for disks (floppy, CD-R(W), DVD-R(W), zip, jazz, hard disks, usb keys, etc.). The dar (“disk archiver”) command is intended to replace tar by offering more backup and archiving functionality. It is especially useful at creating full, differential, and incremental backups. dar Command Examples 1. The following command creates […]
lastlog: command not found
The lastlog command is similar to the last command, but instead of listing the most recent login events, it lists all users and the last time they logged in. This command retrieves information from the /var/log/lastlog file. lastlog Command Options Option Description -t n Print only logins more recent than n days ago. -u name […]
journalctl: command not found
The journalctl command enables you to view and query log files created by the journal component of the systemd suite. Log information is collected and stored via the systemd journald service. You can use journalctl to print the entire journal log, or you can issue various options with the command to filter the log in […]
journalctl Command Examples in Linux
The journalctl command enables you to view and query log files created by the journal component of the systemd suite. Log information is collected and stored via the systemd journald service. You can use journalctl to print the entire journal log, or you can issue various options with the command to filter the log in […]
ipset: command not found
IP sets are stored collections of IP addresses, network ranges, MAC addresses, port numbers, and network interface names. The iptables tool can leverage IP sets for more efficient rule matching. For example, let’s say you want to drop traffic that originates from one of several IP address ranges that you know to be malicious. Instead […]
ipset Command Examples in Linux
IP sets are stored collections of IP addresses, network ranges, MAC addresses, port numbers, and network interface names. The iptables tool can leverage IP sets for more efficient rule matching. For example, let’s say you want to drop traffic that originates from one of several IP address ranges that you know to be malicious. Instead […]
firewall-cmd Command Examples in Linux
The firewall-cmd command enables you to configure firewalld by querying, adding, modifying, and deleting zones and services as desired. Because firewalld is the default firewall service for many Linux distributions, including Red Hat® Enterprise Linux® and CentOS®, you will be using the firewall-cmd command regularly. The command includes options to identify which zone and which […]
iptables Command Examples in Linux
The iptables tool enables you to manage packet filtering as well as stateful firewall functionality within Linux through various tables. Each table applies to a certain context and consists of rule sets, called chains, that the table uses to implement the firewall. A packet is compared to the first rule in the appropriate chain, and […]
aa-disable: command not found
AppArmor is an alternative context-based permissions scheme and MAC implementation for Linux. Whereas SELinux is more commonly associated with RHEL, AppArmor is packaged with Debian-based and SUSE Linux distros. AppArmor provides the same fundamental service as SELinux, but its approach is different in many significant ways. Perhaps the most overarching difference is that SELinux is […]