Advice for everyday Unix systems administration and some clever ways to approach more challenging problems.
Complexity isn't all bad. Sometimes it comes with a tremendous boon to security. Are you ready to cozy up to SELinux? Maybe it's time.
Hardening tips for Unix systems have been issued for decades, but when's the last time you stopped to review how your servers stack up against the latest advice from the sages? Let's check out some of the recommendations provided for Red Ha....
As we find ourselves hurtling toward 2013, it's a good time to think about all the things that we Unix admins would never do ... and how that keeps us out of trouble.
Do you get calls at odd hours because some critical service that you support on your Linux server has stopped working? Here's some late night reading that might help you get the rest you deserve.
Do your hands get sweaty when you have to make changes on your Linux firewall? Iptables isn't as intimidating as it might first seem. After all, it's just a set of tables, and chains, and rules, and the bare essentials of connecting to your....
The ulimit command can keep disaster at bay on your Linux systems, but you need to anticipate where limits will make sense and where they will cause problems.
Samba, the tool that makes it possible to mount Unix directories on Windows systems also works the other way -- allowing you to mount Windows shares on Unix. With an extra package and a few changes in the syntax, you can choose to share files on eith....
Some of my favorite time-savers are here for sharing. Add a comment and tell me about some of your favorite Unix commands.
Before you backup your servers, trouble shoot your major application or read your emails, maybe you should review your grammar. A geek contemplates past and present participles.
Take your Linux servers to the next level by taking advantage of LVM2 -- the best way to manage your disk space!
Basic use of the history command is part of any good introduction to Unix, but there's a lot more to this basic feature than repeating your most recent commands. In fact, some of the more useful applications of command history are typically over....
Have you been putting off setting up an Intranet site because you can't afford the guy who could set it up and manage it for you? Here's an option that you might want to consider.
Are you still living in the world of 755; of user, group and other; and of chmod? If you haven't put Unix ACLs into use, maybe it's time to reconsider how they might compliment your system security process.
Coming soon to a Linux near you? The dramatic improvements in Linux booting are slowly taking over and traditional start scripts are fading fast.
Anyone too comfortable with the idea of run states on Unix systems might not be ready to hear this, but the process of going from a cold piece of hardware to multi-user mode has taken a couple very sharp turns in the last six years or so. Maybe you j....
The sudo command can give you fine-grained security on your Unix servers, but only if you avoid giving too many people the right to run any command as root, especially any command as root without proper logging.
Q: Why don´t you see Penguins in Britain? A: Because they´re afraid of Wales But, if you did, they'd probably be reading this fun new book -- Ubuntu Made Easy: A Project-Based Introduction to Linux, no starch press, 2012 is the most ....
sed is the command of choice for changing this to that between a set of pipes, but there are a lot more tasks you can use it for -- some that it handles much better than the more obvious choices.
Want a script that sends you (up to) monthly sar reports without you having to think about the process? Today's script is way smarter than what I showed you a few weeks ago. It just works with the data it finds.
Some Unix/Linux systems require that a username and password be entered for login. Some can be set up to log you in automatically. For Lubuntu -- a lightweight version of the popular Ubuntu distribution, you can move between these two login options w....
The best way to learn Linux is to use it. A good introductory book will help, but you won't really learn Linux or become confident in your skills unless you park yourself in front of a Linux system and start typing (and popping windows open, cre....
If you don't have sar already installed and running on your Solaris or Linux server, setting it up to monitor performance is so easy, there's no good reason to wait. Follow these simple steps and you'll be monitoring performance on you....
One of the best tools for routine performance monitoring is built into many Unix systems -- sar, the system activity reporter.
A key element in the ISO 27001 certification process is to identify and assess risks. While this idea may seem obvious, you may be surprised at how much you can learn about your systems, processes and security threats by pushing them through this ver....
The first step is justifying the first step. Why are you willing to go through an arduous certification process? How it will help your company? The next is getting a whole lot closer to exactly what that means.
A relatively new international standard sets expectations for information security, but is it any better than what you're already doing to protect your systems and your company's intellectual property? Let's examine what it means to be....
If you have need to balance traffic among a set of servers and can't afford a load balancer, you can get fairly effective relief using what is often referred to as "poor man's load balancing" -- an easy trick that you implement on....
Adding swap space to a hurting Linux server is not only easy, but it works. With a few strokes of your hand, you can add swap space and get the system using it. Run another command and see how much difference the change has made.
There are several useful commands for looking at memory use on Linux systems, but if you don't know what the numbers mean, you may think your systems are in bad shape when they're really OK.
Need to move files between Unix and Windows? No problem. There are several different ways of doing just that. One will surely meet your need.
Save yourself some time by taking advantage of Perl's easy ability to manipulate text. When it comes to Perl, if you can describe it, you can do it.
You may be a Unix devotee, but if your organization uses both Windows and Unix systems, you need to understand how password complexity is configured on both platforms.
Solaris 10 is the first version of Solaris to provide a complex set of variables for controlling password strength. The /etc/default/passwd file contains a series of parameters -- most commented out when a system is first installed -- that allow you ....
Sound advice against the use of bad passwords has been around for decades. Yet I still find people electing to use passwords like pa55w0rd and login123 as if they'd never heard about password cracking programs. Even technical professionals -- pr....
If you are still learning Unix or have any involvement in helping others master the command line, here's the book you have been waiting for. The Linux Command Line: A Complete Introduction (no starch press, 2012) will take you from 0 to 100 in 3....
Access governance is more than just the coolest concept since virtualization and cloud computing. It's likely to change the way you manage accounts on your servers. Designed to add clarity and control to questions like "Who has access to th....
How many special shell $ arguments do you use in your daily work? There may be a lot more of them than you think. Let's look over a bunch of them and examine how they can streamline your scripts.
If you haven't made the mistake of accidentally removed important files, you probably haven't worked with Unix very long. Here are some creative ways of keeping you from making that mistake.
Sandra Henry-Stocker's long-standing and largely happy relationship with Unix has been an interesting and rewarding trek. If she hasn't helped you to love Unix, let her try just once more.
The arp command is a tool that allows you to display the IP address to hardware (MAC) address mappings that a system has built so that it doesn't have to fetch the same information repeatedly for systems it communicates with.
One metric that helps gauge how well your network is holding up to the strain of busy users and applications is the number of packets that slam into other packets, generating what is called a "collision". Let's check out an easy tool ....
The find command is not just useful for locating files, but also for doing things with the files once it finds them. You can find files based on numerous criteria -- their names, their owners, their size, etc. -- and you can then perform some operati....
Sponsored Links