Advice for everyday Unix systems administration and some clever ways to approach more challenging problems.
Blacklisting modules prevents them from being loaded and used, and it is sometimes an important step in keeping a system running properly.
The colors used on the Linux command line are intended to provide an easy way to identify files by type. You can change them, but you should have a good reason before you do.
Cisco shares have risen nearly 20 percent in 2018, making it the best performer in the Dow. What changes have energized this surprising push to the top of tech?
In spite of the huge differences between Linux and Windows, sharing files between the systems is surprisingly easy. Here’s a look at two very different ways to make this happen.
How to use the expr, factor, jot, and bc commands to do math calculations on Linux systems.
How to use the find, locate, mlocate, which, whereis, whatis, and apropos commands to find files on Linux systems.
A new version of the Fedora Linux distro, Fedora 28, was released in its beta version. Here's a look at some of its new features.
Some see a lot of promise in the evolution of "fish" on Linux -- a shell with a some unusual behaviors.
With calendars on Linux, you can get more than just reminders of what day it is. Commands such as date, cal, ncal and calendar provide helpful information.
The "last" command provides some easy ways to see who has been logging into your system and when, but with a little more work, you can ask it to report on a specific time period.
Ava from Ava Robotics, a startup with deep technical ties to iRobot, brings her charming personality to the telepresence marketplace.
The ip command provides a lot of information on network interfaces. Here's some advice to help you understand what it's telling you.
Linux command history is not just about repeating commands. You can selectively decide what to remember and whether to record the date and time your commands were used.
Some Linux commands recurse without being asked, while others have to be nudged with just the right option. Here are some ways to use it to make you tasks easier.
When the Linux kernel detects something on the system violated the kernel's rules about proper behavior, it will shut the system down and issue an "oops."
Support for container technology deriving from Lawrence Berkeley National Lab is getting a boost in enterprise and commercial markets through the formation of a new company, Sylabs.
The Linux ranger is a file manager that works in a terminal window and provides a smooth way to view and edit files.
Named pipes aren't used all that often, but they provide some interesting options for inter-process communications.
Joe Brockmeier, a senior evangelist at Red Hat, explains the benefits of containers on Linux, how they work and how to prepare to use them.
IT leaders are under increased pressure to ensures systems can withstand natural disasters, attacks, and increasing storage and data accessibility needs.
Available this summer, the new BeamPro 2 promises more realistic telepresence visits with colleagues, customers, patients and others.
>How are the Linux vendors addressing the recently-exposed Intel processor flaw? I asked Red Hat and got some solid answers.
New Year's resolutions for Linux admins and users
ASCII plays a much more important role on our systems than generating techno-art. Let's explore the commands that allow you to see how it works.
Learn how to easily extract content from compressed Linux files — without having to memorize a suite of syntactical options
Some of the most useful commands for gaining insights into the packages installed on your Linux system — Debian style
Linux systems offer lots of options for compressing files. Here's some advice for choosing the ones best for you.
Helping to usher in the Industry 4.0 era, NXP Semiconductors announced OpenIL, a Linux distribution meant for smart factory automation.
Creating command groups in /etc/sudoers can make managing user privileges easier and smarter.
Some helpful hints for using sudo — the command that allows admins to administer user system privileges
To remain relevant — and employed — not only do you have to keep your skills up to date, but you might have to embrace the IoT explosion.
Suitable Technologies' Beam telepresence systems elevate remote meetings and interaction with remote staff and customers.
What Linux commands bring up visions of monsters and ghosts? Let’s look and see!
How to use the ip, ethtool, traceroute, tcptraceroute, and tcpdump commands to see what's up with your network on Linux systems.
To make sure files aren't removed accidentally when running the Linux find command, use the -ok command. It will ask for permission before removing any files.
Ping commands are useful, but would-be attackers often use them to identify systems. To prevent that, we show you how to get your system to ignore these requests.
The /proc file system provides amazingly detailed views into your processes and your system's guts.
There are many clever ways to hunt down files on Linux systems. Here's a look at the most useful commands and options.
All you need to know about Linux umask — how the settings work and why they're important.
Learn how run levels are configured and how you can change the run level interactively or modify what services are available.
Configuring login messages on Linux servers is more complex and dynamic. Let's look at the message of the day setup on an Ubuntu server to decipher how the process works.
Some very useful Linux commands for making life on the command line more rewarding
Ever wonder how logrotate manages log files so well? Let's dive into some of the details.
Environment variables on Unix systems — how to understand, modify and appreciate them
The GNU aspell tool is a very clever utility for not only checking your spelling, but also fixing it.
Signals on Unix systems are critical to the way processes live and die. This article looks at how they're generated, how they work, and how processes receive or block them.
The Entropy Engine can deliver 350 Mbps of true random numbers—enough to give a data center enough random data to dramatically improve all cryptographic processes.
A survey of IEEE engineers reveals some interesting and surprising trends about the Internet of Things.
On Unix systems, there are many ways to generate random numbers and many important roles that random data plays.
Sponsored Links