Category Archives: Knowledge Base

How to Copy, Cut and Paste in Vim / Vi
How To Copy, Cut And Paste In Vim / Vi This article shows how to copy, cut, and paste in Vim / Vi editor. When working with text files, copying,...
Continue reading
How to Add User to Sudoers in Debian
How To Add User To Sudoers In Debian This tutorial shows two ways to grant sudo privileges to a user. The first one is to add the user to the...
Continue reading
How to use stat command in linux.
How To Use Stat Command In Linux. This article explains how to use stat command. stat is a command-line utility that displays detailed information about given files or file systems....
Continue reading
How to remove & delete File and directories in linux.
How To Remove & Delete File And Directories In Linux. This tutorial, will show you how to use the rm, unlink, and rmdir commands to remove files and directories in...
Continue reading
How to use Fsck Command.
How To Use Fsck Command. In this article, we will talk about the fsck command. fsck (file system check) is a command-line utility that allows you to perform consistency checks...
Continue reading
How to Compare Strings in Bash
How To Compare Strings In Bash This tutorial describes how to compare strings in Bash. When writing Bash scripts you will often need to compare two strings to check if...
Continue reading
How to use Whoami Command
How To Use Whoami Command In this article, we will cover the whoami command. As its name suggests, the whoami command prints the user name of the effective user ID....
Continue reading
How to Mount Windows Share on Linux using CIFS
How To Mount Windows Share On Linux Using CIFS In this tutorial, we will explain how to manually and automatically mount Windows shares on Linux systems. The Common Internet File...
Continue reading
How to use W command
How To Use W Command In this article, we will talk about the w command. w is a command-line utility that displays information about currently logged in users and what...
Continue reading
Understanding the /etc/passwd File.
Understanding The /Etc/Passwd File. There are several different authentication schemes that can be used on Linux systems. The most commonly used and standard scheme is to perform authentication against the...
Continue reading

At NexonHost, we believe that everyone deserves to have their services and applications be fast, secure, and always available.

Follow us

Quick Links

Newsletter

Be the first who gets our daily news and promotions directly on your email.

Copyright © 2025 . All Rights Reserved To NexonHost.