git checkout remote branch – How to, Examples and Options

git checkout command is used to checkout code from your local repository. if you are working in a project where many different teams are collaborating , you will need to use git remote checkout to review and checkout the code from the remote server hosting the repository. find out how to use git remote checkout correctly with examples.

fsck Messages, Meaning and Solutions

fsck message can be cryptic and many times it is difficult to understand it is great challenge to decide about the response to provide for fsck prompts.

This article describes  the fsck error messages and possible action that can be performed  during each phase of fsck.  If you are looking for fsck and related information, you can find it in this article fsck – Check & Repair Unix and Linux File Systems

These are the phases and detailed errors, messages  with their meaning

Best Health Apps for iPhone in 2019 You Shouldn’t Miss Out

Your health determines the quality of your life. Though gym sessions play a significant role in ensuring you stay fit and healthy, the advancement of technology has made it possible to achieve your fitness goals, build your strength and improve your health from your phone. You can now use your smartphone as your health coach to prevent diseases such as high blood pressure or heart attacks. There are a plethora of apps available for you that are cost effective and can help you to maintain a healthy lifestyle. However, choosing the right app can be a dilemma.

Six Common Mistakes For Python Programmers To Avoid

Python, at first glance, is a simplistic programming language which anyone could master easily, with enough practice and dedication. However, while there are some common mistakes which are especially prevalent with beginner coders, even advanced Python programmers can make some mistakes when they underestimate the power of every character you write in this language, so read on for some of the most common and advanced mistakes.

TLS vs SSL: What’s the Difference ?

Online security is vital these days if we want to avoid becoming victims of unscrupulous malware, spyware, and phishing attacks. With internet criminals becoming more and more crafty, sophisticated and highly organized, the only way to ensure adequate protection is to make sure that your online activities are protected by the latest security protocols.

Top 10 Project Management Tools for Agile Development

Software companies are managing complex projects due to the increasing and compounded business requirements, finding themselves in need of an agile project management tool that is not only intuitive but helps them handle their projects in a timely and effective manner. Agile project management software helps users to plan and oversee a project throughout all of the development phases. This grants a significative advantage to managers because it also offers the possibility of laying out the stages of product development by establishing deadlines and creating tasks.

Top 10 Bash Programming Guides, Reference & Tools

Bash is a Unix/Linux  command interpreter (shell). Bash is the Bourne Again SHell created as part of  GNU Project.  Bash is an Bourne  shell compatible shell that incorporates useful features from the Korn shell (ksh) and C shell (csh). It offers functional improvements over Bourne shell  for both programming and interactive use. In addition, most Bourne shell scripts can be run by Bash without modification. Bash  is intended to conform to the IEEE POSIX P1003.2/ISO 9945.2 Shell and Tools standard.

Bash was originally written by Brian Fox of the Free Software Foundation. The current developer and maintainer is Chet Ramey of Case Western Reserve University.

The improvements offered by Bash include:

  • Command line editing
  • Unlimited size command history
  • Job Control
  • Shell Functions and Aliases
  • Indexed arrays of unlimited size
  • Integer arithmetic in any base from two to sixty-four

Here are the top 10 Bash Programming Guides, Reference  & Tools

How to Remove ^M in Linux & Unix

Control M ( ^M)  characters are introduced when you use  lines of text from a windows computer to  Linux or Unix machine.  Most common reasons are when you directly copy a file from a windows system or submit form data copied and pasted from a windows machine.

Detecting ^M characters

^M is non printable character and often becomes difficult to find, in order to see if your file contains any non printable character use the cat command with -v option

$cat -v filename

Methods to remove ^M

In all these method , real secret is not to type ^M using keyboard but rather typing in control key sequence to get the ^M control character.