When we have to take screenshots in Ubuntu, we usually use the Screenshot application or the Print Screen utility. This way of taking screenshots is mostly helpful but it lacks one feature; taking screenshots of the login and lock screens.
By default, the Launcher in Ubuntu is located vertically at the left side of the screen. With Ubuntu 17 and 18, it is very easy to move the launcher to the right side of the screen or to the bottom.
From time to time, we need to clear up our system storage to make space for installing new programs and dealing with additional files. This is especially important when you have a low storage device or a limited storage capacity.
Why Change the Login Screen? You might have noticed that, like all the previous versions, the latest versions of Ubuntu like Ubuntu 17 and 18 also come with a very plain looking login screen. Whether you like it or not,
After installing a new Operating System that we intend to use for long, we start noticing the things we would like to customize according to our needs, preferences, and personal choices. It starts from the look & feel of the
Ubuntu allows you to customize your long and rugged bash commands by using short and pleasant aliases as a replacement. When you are working on the command line, you can just use an alias instead of the entire command you
While working with files and folders as a Linux Administrator, we frequently need to access and edit files and folders that require root permissions. We usually perform this task through the Ubuntu Terminal(the command line utility) using the sudo function.
What is KVM? KVM or Kernel-Based Virtual Machine provides a virtual environment used for running one or more additional operating systems besides the primary system without interfering with its functions. In KVM, the Linux Kernel makes use of the virtualization
Linux, like all operating systems, keeps initial/default settings and configuration parameters for its programs in the form of configuration files. These files are used to configure software applications, server processes and OS settings for your system. As Linux administrators, you
As a common practice, users are required to provide authentication information to log on to a Linux system. This helps in securing any sensitive or personal files, emails and other data residing on your system from any physical intrusion. However,