From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Unlock this course with a free trial
Join today to access over 24,300 courses taught by industry experts.
Ending processes with top - Linux Tutorial
From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Ending processes with top
- Now let's show how to end processes with top, and we'll throw in a little bit of keyboard shortcuts for working with processes as well. We're still in Lab 31, and so we'll jump over to our Debian system now, and we'll go full screen on here, and run the top program once again. Now, I primarily use top to analyze the system and terminate processes that are not behaving, so this is what I use top for quite often. So, for example, let's say a web browser freezes up, and we'll go and open a web browser once again, jump back into top. So, we open top and we view the processes. So, chances are that if the program is freezing up or using a lot of resources, it'll be listed first at the top. So, we open up top and view the processes. If it's there, that's great, if not, we can do that filter and find it. And the key here is that we're looking for the Process ID, normally, but we don't necessarily have to use that. Within top, we could just press the K letter on the keyboard, which is just…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Learning objectives1m 34s
-
(Locked)
Introduction to nftables and the nft command2m 34s
-
(Locked)
nftables setup4m 5s
-
(Locked)
Tables > Chains > Rules2m 31s
-
(Locked)
Building the nftables configuration, part 18m 41s
-
(Locked)
Building the nftables configuration, part 28m 39s
-
Saving and restoring the nftables configurations8m 36s
-
(Locked)
Translating iptables to nftables7m 49s
-
(Locked)
-
-
(Locked)
Learning objectives1m 18s
-
(Locked)
Review of SSH1m 47s
-
(Locked)
Using keys to connect via SSH12m 57s
-
(Locked)
The sshd_config file3m 19s
-
(Locked)
Modifying the default SSH port7m 32s
-
(Locked)
Disabling password-based SSH2m 57s
-
(Locked)
Disabling root login via SSH2m 32s
-
(Locked)
Exclusive SSH groups4m 37s
-
(Locked)
Authentication settings10m 6s
-
(Locked)
Terminating SSH connections, part 17m 45s
-
(Locked)
Terminating SSH connections, part 26m 51s
-
(Locked)