Advice for everyday Unix systems administration and some clever ways to approach more challenging problems.
Named pipes aren't used all that often, but they provide some interesting options for inter-process communications.
Joe Brockmeier, a senior evangelist at Red Hat, explains the benefits of containers on Linux, how they work and how to prepare to use them.
IT leaders are under increased pressure to ensures systems can withstand natural disasters, attacks, and increasing storage and data accessibility needs.
Available this summer, the new BeamPro 2 promises more realistic telepresence visits with colleagues, customers, patients and others.
New Year's resolutions for Linux admins and users
ASCII plays a much more important role on our systems than generating techno-art. Let's explore the commands that allow you to see how it works.
Learn how to easily extract content from compressed Linux files — without having to memorize a suite of syntactical options
Some of the most useful commands for gaining insights into the packages installed on your Linux system — Debian style
Linux systems offer lots of options for compressing files. Here's some advice for choosing the ones best for you.
Helping to usher in the Industry 4.0 era, NXP Semiconductors announced OpenIL, a Linux distribution meant for smart factory automation.
Creating command groups in /etc/sudoers can make managing user privileges easier and smarter.
Some helpful hints for using sudo — the command that allows admins to administer user system privileges
To remain relevant — and employed — not only do you have to keep your skills up to date, but you might have to embrace the IoT explosion.
Suitable Technologies' Beam telepresence systems elevate remote meetings and interaction with remote staff and customers.
What Linux commands bring up visions of monsters and ghosts? Let’s look and see!
How to use the ip, ethtool, traceroute, tcptraceroute, and tcpdump commands to see what's up with your network on Linux systems.
To make sure files aren't removed accidentally when running the Linux find command, use the -ok command. It will ask for permission before removing any files.
Ping commands are useful, but would-be attackers often use them to identify systems. To prevent that, we show you how to get your system to ignore these requests.
The /proc file system provides amazingly detailed views into your processes and your system's guts.
There are many clever ways to hunt down files on Linux systems. Here's a look at the most useful commands and options.
All you need to know about Linux umask — how the settings work and why they're important.
Learn how run levels are configured and how you can change the run level interactively or modify what services are available.
Configuring login messages on Linux servers is more complex and dynamic. Let's look at the message of the day setup on an Ubuntu server to decipher how the process works.
Some very useful Linux commands for making life on the command line more rewarding
Ever wonder how logrotate manages log files so well? Let's dive into some of the details.
Environment variables on Unix systems — how to understand, modify and appreciate them
The GNU aspell tool is a very clever utility for not only checking your spelling, but also fixing it.
Signals on Unix systems are critical to the way processes live and die. This article looks at how they're generated, how they work, and how processes receive or block them.
The Entropy Engine can deliver 350 Mbps of true random numbers—enough to give a data center enough random data to dramatically improve all cryptographic processes.
A survey of IEEE engineers reveals some interesting and surprising trends about the Internet of Things.
On Unix systems, there are many ways to generate random numbers and many important roles that random data plays.
The Unix shell's && and || operators have some interesting and not-so-obvious behaviors.
The column command can reformat the output from various commands to make it more useful or appealing
Want a process to keep running even after you log off? No problem. Use nohup. It's easy.
Ready to make the Linux history command work harder to serve your needs? Let's look at some new tricks you might want to shove up your sleeve.
The jot command is very handy for generating lists of numbers or characters in almost any way you might imagine
NIST's new guidelines for password complexity have reversed many of rules on what defines a good password
With only one year until this business-changing regulation goes into effect, it's time for companies to start planning their approach. Let's run through eight steps you can take to be ready.
Password complexity settings on Linux systems is a lot more interesting -- and complex -- than it might appear.
Today's cyber and terrorist threats are getting worse and more frequent, but you can limit the damage and lessen the likelihood of a successful attack. What are those who deal these issues everyday trying to tell us and how can we put their insi....
How to get a clear view of network bandwidth usage on a Linux system.
Things to watch and tools to use to make sure your Unix/Linux systems maintain their health and vigor
The 3rd edition of this book will have you confidently using Wireshark to solve the kind of problems you're likely to run into. You'll be capturing and analyzing packets, understanding network protocols, and gaining important insights into ....
Symbolic and hard links can save both time and disk space. In this post, you will see how they are different and how they are created and used.
There are lots of ways to compare files on Unix systems and some of the choices are going to be just right for you
It's not quite as hard as it sometimes seems
Humble Bundle and No Starch Press have pulled together to offer a really sweet deal on digital books on Python.
Sponsored Links