Linux Tech Enthusiast
Author

Linux Tech Enthusiast

Focused on sharing practical Linux technology content, covering Linux fundamentals, applications, tools, as well as databases, operating systems, network security, and other technical knowledge.

125
Articles
0
Likes
0
Views
0
Comments
Recent Articles

Latest from Linux Tech Enthusiast

100 recent articles max
Linux Tech Enthusiast
Linux Tech Enthusiast
Feb 25, 2026 · Fundamentals

How Linux File Systems and Disk I/O Work

The article explains Linux's core storage components—inode, dentry, superblock, and logical blocks—how the Virtual File System abstracts different file systems, the classification of file systems and I/O types, disk technologies, the block layer, I/O schedulers, and practical performance metrics and monitoring tools.

I/O schedulerLinuxPerformance Monitoring
0 likes · 20 min read
How Linux File Systems and Disk I/O Work
Linux Tech Enthusiast
Linux Tech Enthusiast
Feb 24, 2026 · Fundamentals

Understanding the TCP Communication Protocol: Features, Handshakes, and Optimizations

This article explains TCP as a connection‑oriented, reliable byte‑stream transport protocol, detailing its header fields, state machine, three‑way handshake, four‑way termination, TIME_WAIT handling, Linux inspection commands, optimization techniques, and a comparison with UDP, all illustrated with concrete examples and diagrams.

LinuxNetwork ProtocolSocket
0 likes · 27 min read
Understanding the TCP Communication Protocol: Features, Handshakes, and Optimizations
Linux Tech Enthusiast
Linux Tech Enthusiast
Feb 23, 2026 · Information Security

What Programming Languages Do Hackers Prefer? Survey and Exploit-DB Analysis

A 2021 CCC member survey and a large‑scale analysis of Exploit‑DB reveal that hackers predominantly use Shell scripts and Python, with notable overlap across both data sets, while language preferences shift over time toward Python and away from C, highlighting detection challenges and future trends.

Information SecurityPythonexploit-db
0 likes · 11 min read
What Programming Languages Do Hackers Prefer? Survey and Exploit-DB Analysis
Linux Tech Enthusiast
Linux Tech Enthusiast
Feb 21, 2026 · Fundamentals

What Happens After You Type a URL? A Step‑by‑Step Animation

When you enter a URL, the browser checks multiple caches for the IP, performs recursive DNS lookup if needed, establishes a TCP connection and HTTPS handshake, sends an HTTP request, receives a 200 response, and then parses HTML, CSS, and JavaScript to build and render the page.

Browser RenderingDNSHTTPS
0 likes · 4 min read
What Happens After You Type a URL? A Step‑by‑Step Animation
Linux Tech Enthusiast
Linux Tech Enthusiast
Feb 20, 2026 · Fundamentals

How Routers Work: From Routing Tables to Dynamic Path Selection

Routers, also known as gateways, connect separate networks by using routing tables to determine the optimal path for packets, employing direct, static, and dynamic routes, following longest‑match and cost metrics, and handling three‑layer IP addressing to forward data across diverse subnets.

Dynamic RoutingIP addressingNetworking
0 likes · 7 min read
How Routers Work: From Routing Tables to Dynamic Path Selection
Linux Tech Enthusiast
Linux Tech Enthusiast
Feb 19, 2026 · Operations

600 Essential Linux Commands A‑Z: Complete Cheat Sheet

A comprehensive A‑Z reference of over 600 common Linux commands, each with a brief description of its function and typical usage, providing a handy quick‑lookup guide for system administrators, developers, and anyone working with the Linux command line.

Unixbashcommand-line
0 likes · 21 min read
600 Essential Linux Commands A‑Z: Complete Cheat Sheet
Linux Tech Enthusiast
Linux Tech Enthusiast
Feb 18, 2026 · Operations

Top Nginx Performance Tweaks: Worker Processes and CPU Affinity Explained

This guide shows how to edit nginx.conf to adjust worker_processes based on CPU cores, explains when I/O blocking requires extra workers, and demonstrates Linux‑only worker_cpu_affinity settings with concrete examples for 2, 4, and 8‑core systems, including the exact commands to apply and reload the configuration.

ConfigurationNginxPerformance
0 likes · 4 min read
Top Nginx Performance Tweaks: Worker Processes and CPU Affinity Explained
Linux Tech Enthusiast
Linux Tech Enthusiast
Feb 17, 2026 · Game Development

What Language Were Classic FC Games Written In?

The article explains that classic FC (NES) games like Super Mario and Contra were programmed in NES-specific assembly language because the 6502 CPU and the console’s tight 2 KB RAM and 40 KB ROM constraints required low‑level, opcode‑precise code for optimal performance.

6502 CPUAssembly LanguageFC Console
0 likes · 4 min read
What Language Were Classic FC Games Written In?
Linux Tech Enthusiast
Linux Tech Enthusiast
Feb 14, 2026 · Operations

8 Surprising Ways to Use the ‘!’ Operator in Linux Commands

This article explores eight practical uses of the ‘!’ history‑expansion operator in Linux shells, covering numbered command recall, negative indexing, argument reuse, multi‑parameter handling, keyword‑based recall, repeat‑last‑command shortcuts, selective file deletion, and directory‑existence checks, each illustrated with concrete examples.

Command Linebang operatorbash
0 likes · 10 min read
8 Surprising Ways to Use the ‘!’ Operator in Linux Commands
Linux Tech Enthusiast
Linux Tech Enthusiast
Feb 12, 2026 · Industry Insights

Why Your PC Is Getting Faster: Inside Intel’s New x86S Architecture

The article explains how Intel’s newly announced x86S architecture simplifies the decades‑old x86 design by dropping 16‑ and 32‑bit modes while still supporting legacy 32‑bit applications, reducing processor complexity and improving performance amid growing ARM competition.

64-bitCPU architectureCompatibility
0 likes · 10 min read
Why Your PC Is Getting Faster: Inside Intel’s New x86S Architecture