sed: case insensitive actions (search replace delete..)
In this article I will show you different ways to perform an action (as per your requirement) ignoring the case of the letters to be searched in a file Below is our sample file #
In this article I will show you different ways to perform an action (as per your requirement) ignoring the case of the letters to be searched in a file Below is our sample file #
In this article I will show you various sed expressions which can be used and combined to print or delete specific line from a file IMPORTANT NOTE: My examples provided are only to print the
We intend to write multiple scripts in the %pre and %post section of the kickstart files as per our requirement but since these scripts are executed in the background it is very important that we
Sub-query The inner query execute first, the outer query deprnds on inner query output. Correlated sub-query The outer query execute first, the inner query deprnds on outer query result. A correlated sub-query is where the
Below steps are validated on Red Hat Enterprise Linux 7. Auto-logout functionality is mostly used to logout a user if the session is idle for a while. Using this article you should be able to
In my last article I shared the steps to protect GRUB2 from booting kernel without password in Linux With Red Hat Enterprise Linux 7 they have introduced a network device naming scheme wherein it provides
There are multiple types of network which can be configured in Oracle VirtualBox, so before going ahead you must be clear on your requirement. Here let me give you a brief overview of the type
We use Linux for many reasons. Security is just one of them, but it’s undeniable that Linux is more secure than other operating systems. Securing our data is especially important to us, since our devices