Linux Resources

Umask Command in Linux - Overview

This article covers how to use UMASK in the Linux system. On Linux operating systems, new files are created with a default set of permissions. Specifically, a new file's permissions may be restricted in a specific way by applying a permissions "mask" called the umask. The umask command is used to set this mask, or to show you its current value.

Route Command in Linux with examples

This article covers how to use the route command in a Linux system with examples. Linux provides the ip route command in order to manage the routing table. The routing table is used to set routes for different destination IP addresses. Even there is a default route in most of the cases which are used to sent IP packets to the other networks we may need to add new routes via the command-line interface by using the ip route add command.

Important Linux commands:

  • arp — Manipulate the system ARP cache.
  • ifconfig — View or modify the configuration of network interfaces.
  • ip — Display and manipulate information about routing, devices, policy routing and tunnels.
  • netstat — Print information about network connections, routing tables, interface statistics, masquerade connections, and multicast memberships.

Fix the Error "Unable to Launch Cinnamon-Session-Cinnamon" in Linux Mint 20

This article covers steps to resolve the "cinnamon not found" error on a Linux Mint 20 machine. 

To fix this error, simply do the following:

1. Boot to the Linux mint version.

2. Wait for the login screen and login.

3. Get the error? Click ok.

4. Get the black screen? Type CTRL-Alt F1

5. Get the prompt?

6. Login with your name and password.

7. Install cinnamon by running the following commands:

$ sudo apt-get update
$ sudo apt-get install nemo
$ sudo apt-get install cinnamon
$ reboot

Top 11 Free and Open-Source Linux Distributions for Hacking

This article covers the best free and open-source Linux distributions that provide the most efficient and capable platform to learn and perform ethical hacking tasks such as BackBox, Kali Linux, Fedora Security Lab, Parrot OS, BlackArch Linux, and Dracos Linux. Choosing the best OS for Hacking & penetration testing is a good sign to learn ethical hacking and Penetration testing concepts to enhance your skills and protecting the enterprise assets from cybercriminals.

Install LAMP Stack on CentOS 8 - Step by Step Process ?

This article covers how to install the LAMP stack on the CentOS system. If are using another Linux distribution, visit how to install LAMP stack on Debian, Ubuntu, Red Hat, and Rocky Linux. Basically, A LAMP stack is a collection of open-source software that you can use as a platform to create websites and web applications. The term LAMP is an acronym standing for Linux operating system, the Apache HTTP Server, the MySQL database system, and the PHP programming language.


  • Linux serves as the server's operating system that handles all the commands on the machine.
  • Apache is a web server software that manages HTTP requests to deliver your website's content.
  • MySQL is a relational database management system (RDBMS) whose function is to maintain user's data on a server.
  • PHP is a scripting language for server-side communication.

Open an Image in Linux Mint 20 Terminal

This article covers different ways of opening an image in Linux Mint 20 terminal. 

To install ImageMagick on Debian or Ubuntu, run the following command:

$ sudo apt-get update && sudo apt-get install imagemagick

Search by typing a one letter Word Term Here