Monday, September 25, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Networking

Btop is a much-improved take on the Linux top command

Researcher by Researcher
July 30, 2022
in Networking
0
Btop is a much-improved take on the Linux top command
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


If you’re on the hunt for an improved version of the Linux top command, Jack Wallen believes btop is the way to go.

server configuration command lines on a monitor
Image: ronstik/Adobe Stock

Open source: Must-read coverage

Over the years, I cannot tell you how many times I’ve had to use the Linux top command to troubleshoot problems on server and desktop deployments. It seems like top should be able to do more, which is why I’m always on the lookout for a replacement of that command.

On the desktop, there’s GNOME System Monitor, which is a well-designed GUI that makes managing processes simple. But even GNOME System Monitor has its limitations.

So when I came across a tool named btop, I was thrilled that it took that old standby and gave it much-needed features. Not only does btop list out various system usages including memory, disks, network and processes, but it also allows for interaction with the mouse. Even on a server installation, you can point and click your way around btop to view processes as a tree, hide or reveal certain displays, and access an options menu where you can tweak the look and feel of the display.

SEE: Top Linux commands admins needs to know (TechRepublic Premium)

The btop features list includes:

  • A game-inspired menu system
  • Full mouse support
  • Arrow keys process selection
  • Detailed stats for the selected process
  • Process filters
  • Easily switch between sorting options
  • Signal send to the selected process
  • Configuration via menu
  • Auto-scaling graph for network I/O
  • Shows IO activity/speeds for disks
  • Battery meter
  • Custom presets

What you’ll need to install and use btop

Btop can be installed on just about any Linux distribution from default repositories. I’ll demonstrate the installation on both a Ubuntu-based distribution and an RHEL-based distribution. Other than having a running instance of Linux, you’ll also need a user with sudo privileges. Let’s get to the installation.

How to install btop

On a Ubuntu-based distribution, which for me is Pop!_OS, the installation is accomplished with the command:

sudo apt-get install btop -y

If you’re on an RHEL-based Linux distribution such as Fedora or Rocky Linux, the installation command is:

sudo dnf install btop -y

How to use btop

From the terminal window, issue the command:

btop

You should immediately be greeted by the btop app (Figure A).

Figure A

Btop is running on Pop!_OS.

Using your mouse, you can click on any section to hide or reveal details and your arrow keys to navigate to a process. If you select a process, click your keyboard’s Enter key to reveal the details (Figure B).

Figure B

The details for containerd are revealed in btop.

If you click Menu at the top left, you can then select Options to access the configuration options available for the app (Figure C).

Figure C

The btop Options menu.

The menu is fairly straightforward, so you shouldn’t have any problem figuring out any of the options.

And that, my fellow Linux admins and enthusiasts, is how to get a much-improved version of top on your desktops and servers. Trust me when I tell you btop will have you leaving top behind without so much as a second of regret.

Subscribe to TechRepublic’s How To Make Tech Work on YouTube for all the latest tech advice for business pros from Jack Wallen.



Source link

Related articles

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

September 22, 2023
How to Create and Use a Docker Secret From a File (+ Video)

How to Create and Use a Docker Secret From a File (+ Video)

September 20, 2023
Tags: BtopCommandLinuxmuchimprovedTop
Share76Tweet47

Related Posts

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

September 22, 2023
0

The attestation service is designed to allow data in confidential computing environments to interact with AI safely, as well as...

How to Create and Use a Docker Secret From a File (+ Video)

How to Create and Use a Docker Secret From a File (+ Video)

September 20, 2023
0

In this step-by-step tutorial, learn how to create and use a Docker secret to help keep your data secure. https://www.youtube.com/watch?v=TfVCXaMRNgM...

Window Closing for Australian Businesses to Upgrade From 3G

Window Closing for Australian Businesses to Upgrade From 3G

September 13, 2023
0

Image: Jon Anders Wiken/Adobe Stock It is the end of an era. Twenty years ago, 3G wireless connectivity started rolling...

Google Cloud Next ‘23: New Generative AI-Powered Services

Google Cloud Next ‘23: New Generative AI-Powered Services

August 30, 2023
0

Image: Sundry Photography/Adobe Stock Google unveiled a wide array of new generative AI-powered services at its Google Cloud Next 2023...

Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits

Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits

August 29, 2023
0

Image: Timon/Adobe Stock A significant portion of social engineering attacks, such as phishing, involve cloaking a metaphorical wolf in sheep’s...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
Microsoft to Block Macros by Default in Office Apps

Qakbot Email Thread Hijacking Attacks Drop Multiple Payloads

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

September 23, 2023
SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

September 23, 2023
Stealth Falcon preying over Middle Eastern skies with Deadglyph

Stealth Falcon preying over Middle Eastern skies with Deadglyph

September 23, 2023
Will you give X your biometric data? – Week in security with Tony Anscombe

ESET’s cutting-edge threat research at LABScon – Week in security with Tony Anscombe

September 23, 2023

Recent Posts

‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

September 23, 2023
SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

September 23, 2023
Stealth Falcon preying over Middle Eastern skies with Deadglyph

Stealth Falcon preying over Middle Eastern skies with Deadglyph

September 23, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cyber Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved