Content pertaining to Linux

Invoking "Night Mode" (Night Shift) For Your PC's Monitor

By admin |

The process of adjusting monitor brightness and gamma—especially to reduce blue light and add warmth to the screen—is commonly referred to as screen temperature adjustment or blue light filtering. The specific technique of reducing brightness and gamma while increasing the color temperature to reduce blue light is often called night mode or night light.

These terms reflect the approach of lowering blue light and adjusting brightness to ease eye strain and support healthier sleep patterns, particularly in low-light environments or during evening hours.

Community Enterprise OS Linux System Setup and Product Review

By admin |

About three years ago I used Virt Manager installed in Feren Linux to create a Virtual Machine of CentOS 8 Linux based on RHEL 8 from Red Hat and then conducted a system setup and product review of this distro on my YouTube Channel called the Linux/Unix/Tech channel.

Adding a Date/Timestamp to the History in Linux

By admin |
While you’re in the Terminal issuing commands, there is a file being updated in the background that you may not have been aware of. This file is called the Bash History file. This assumes, of course, that you’re running the Bash shell. It’s located in a hidden file underneath the $HOME directory of the current logged in user; that is to say, it’s located at ~/.bash_history. This file is generally referred to simply as the History file. When you issue commands in the Terminal in Linux, these commands are recorded in this file.

How You Can Master Your Email Using Evolution

By admin |

If you’re like me, you can easily become overwhelmed with the sheer volume of email that comes into your favorite email client every day. Your Inbox can become bloated with messages from mailing lists you’ve signed up for, from companies and healthcare agencies that you work with, and so on.

Basic Centos 8 Firewall Configuration

By admin |

The firewall is a vital component of any Linux distribution. This is even more important when running a server versus a desktop distro. Firewalls are necessary since they protect a computer system or a network of computers from an external attack especially in a server environment where the server is connected to the Internet in an always-on Internet connection.

Benchmarking a Storage Device in Linux

By admin |

There are a couple of CLI tools that can be used to benchmark an HDD (external or internal). These are dd and hdparm. However, for Debian Linux, there’s a great GUI application that performs Disk Read speed benchmarking and both Disk Read & Write speed benchmarking if the drive being tested is unmounted. The dd command is used to monitor the writing performance of a disk device on a Linux and Unix-like system. An example for testing an internal SSD would be:

$ sudo dd bs=1M count=256 if=/dev/zero of=test

This test can result in output that looks like the following:

Converting Ubuntu 20.04 LTS to Vanilla Gnome3 DE

By admin |

By default, Ubuntu 20.04 LTS is developed with a highly customized Gnome3 desktop which looks very much like the original Unity desktop. Many people, including myself, do not like the look and feel of this desktop even though it is based on the Gnome3 desktop environment. I am assuming that you are familiar with both Linux, the Linux Terminal, and have used Ubuntu Linux in the past. If you don’t meet these prerequisites, then you may find some of the steps in this conversion process to be a little confusing.

Basic File and Folder Permissions in Linux

By admin |

Linux handles file and folder permissions differently than operating systems like Microsoft Windows. Unlike file and folder permissions in the Windows world, Linux does not have what Microsoft Windows refers to as “effective” permissions on files and folders. True, one can change basic permissions on file objects in Linux using Access Control Lists (ACLs) or more appropriately File Access Control Lists (FACLs), but the point of this article is to introduce the new Linux user to the basic file and folder permissions that Linux uses when these objects are created in the system.

Bash Directory Stack

By admin |

What is a stack and why is it important in Linux or Computer Science, for that matter? A stack, in the context of this article, refers to a last-in-first-out (LIFO) list or more affectionately referred to as a pushdown store. This is in contrast to another arrangement called first-in-first-out (FIFO) used in granaries since the grain is loaded at the top of the tower and dispensed at the bottom into trucks or other vehicles for delivery to its destination.

Designating Hot Spares in Your ZFS Storage Pool

By admin |

There is a feature built into ZFS called the “hotspares” feature which allows a sysadmin to identify those drives available as spares which can be swapped out in the event of a drive failure in a storage pool. If an appropriate flag is set in the feature, the “hot spare” drive can even be swapped automatically to replace the failed drive. Or, alternatively, a spare drive can be swapped manually if the sysadmin detects a failing drive that is reported as irreparable.

Hot spares can be designated in the ZFS storage pool in two separate ways: