Advice for everyday Unix systems administration and some clever ways to approach more challenging problems.
Linux gives you lots of ways to create complexity in passwords that include a lot more than just length, such as mixing upper- and lower-case letters with numerals and punctuation marks along with other restrictions.
Edge computing is augmenting the role that Linux plays in our day-to-day lives. A conversation with Jaromir Coufal from Red Hat helps to define what the edge has become.
Unikernels are a smaller, faster, and more secure option for deploying applications on cloud infrastructure. With NanoVMs OPS, anyone can run a Linux application as a unikernel with no additional coding.
ASLR is a memory exploitation mitigation technique used on both Linux and Windows systems. Learn how to tell if it's running, enable/disable it, and get a view of how it works.
Thanks to the efforts of Sylabs, open-source containers are starting to focus on high-performance computing—providing new ways of working for enterprise IT organizations.
Java has been one of the top two programming languages for the past 10 years. How has it stood the test of time? Good design and continuous innovation have a lot to do with it.
Faster, more versatile and secure, Linux gets better every year. Let's take a look at some of the highlights expected in 2019.
The recently released 4.18 Linux kernel has already moved up to 4.18.5. How soon it lands on your system or network depends a lot on which Linux distributions you use.
If you aren't using Kubernetes, it’s probably a good time to familiarize yourself with a technology that is dramatically changing the way applications are being deployed today.
A password guess and five days offline have left not only Gentoo's GitHub admins, but all of us, with some things to think about.
NIST's new guidelines for password complexity have reversed many of rules on what defines a good password
How false friends creep into your facebook community
A deep dive into penetration testing -- the choices made and some surprising findings
With tens of thousands of databases being held for hostage, it's time to focus on underlying problems and strategies.
EMP and its potential consequences for data centers and life as we know it
The chage command allows you to easily expire user passwords, but how it works depends in part on how your accounts are set up to begin with.
Log files on Unix systems can easily grow to hundreds of thousands or even millions of lines. Here's a simple way to pluck out every Nth line.
For more than 20 years, a very serious bug in our beloved bash simply went unnoticed. What have we learned?
Log file rotation of Unix systems just sort of happens ... or does it? You may have a lot more options that you've ever imagined.
Tired of the ls command and want to see more interesting information on your files? Try stat!
Sponsored Links