Advice for everyday Unix systems administration and some clever ways to approach more challenging problems.
Linux just turned 28, and in that time, it has moved from being an interesting project to what is in many ways the most significant operating system, spawning hundreds of distributions and taking over the field of supercomputing.
To rename a group of files with a single command, use the rename command. It requires the use of regular expressions and can tell you what changes will be made before making them.
Linux file systems have evolved over the years, and here's a look at file system types
Getting an idea how often your users are logging in and how much time they spend on a Linux server is pretty easy with a couple commands and maybe a script or two.
The pdftk command for Linux systems provides many options for working with PDFs, including merging pages, encrypting files, applying watermarks, compressing files, and even repairing PDFs.
Log files on Linux systems contain a LOT of information — more than you'll ever have time to view. Here are some tips on how you can make use of it without ... drowning in it.
Linux built-ins are commands that are part of a user’s shell. Sandra Henry-Stocker explains how to recognize them and get help on their use.
Managing user groups on Linux systems is easy, but the commands can be more flexible than you might be aware.
IBM's acquisition of Red Hat is a big deal – a $34 billion big deal – and many Linux professionals are wondering how it's going to change Red Hat's role in the Linux world. Here are some thoughts.
Edge computing is augmenting the role that Linux plays in our day-to-day lives. A conversation with Jaromir Coufal from Red Hat helps to define what the edge has become.
Debugging on multi-process systems just got significantly easier with the release of Live Recorder 5.0 from Undo.
Library injections are less common on Linux than they are on Windows, but they're still a problem. Here's a look at how they work and how to identify them.
There's been a small but significant change in how Linux systems work with respect to runtime data. Here's an overview of the change to /run.
Linux offers several commands that allow you to send email from the command line. Here's look at some that offer interesting options.
Whether you're struggling with one elusive word or checking a report before you send it off to your boss, Linux can help with your spelling.
In case you haven't yet noticed, some incredibly fast solid-state disk technology is as available for Linux as it is for other operating systems.
Sometimes you see more than just the ordinary r, w, x and - designations when looking at file permissions on Linux. How can you get a clearer view of what the uncommon charactrers are trying to tell you and how do these permissions work?
Red Hat issued a security advisory on recently disclosed CVEs (common vulnerabilities and exposures) in Intel microprocessors.
Memory management on Linux systems is complicated. Seeing high usage doesn’t necessarily mean there’s a problem. There are other things you should also consider.
At Red Hat Summit 2019, Red Hat announced the availability of Red Hat Enterprise Linux (RHEL) 8, with support for the Red Hat Container Toolkit, and the Universal Base Image.
The lsmod command can tell you which kernel modules are currently loaded on your system, along with some interesting details about their use.
Copies of files sometimes represent a big waste of disk space and can cause confusion if you want to make updates. Here are six Linux commands to help you identify these files.
Some files on a Linux system can appear in more than one location. Follow these instructions to find and identify these "identical twins" and learn why hard links can be so advantageous.
Variables often look like $var, but they also look like $1, $*, $? and $$. Let's take a look at what all these $ values can tell you.
Unikernels are a smaller, faster, and more secure option for deploying applications on cloud infrastructure. With NanoVMs OPS, anyone can run a Linux application as a unikernel with no additional coding.
Linux user environments simplify your use of the system in many ways. Viewing your settings and modifying them can be tricky, though. Here’s how to do it.
The lp command on Linux systems provides numerous options for printing, such as multiple pages per sheet and page borders, but also just a few quirks to keep you on your toes.
There's a lot more to printing from the Linux command line than the lp command. Check out some of the many available options.
When you need a Linux system to have a static IP address rather than one that is set dynamically, all that's required is some configuration changes and a restart. Follow these steps to make the switch.
A container flaw discovered just last month has been exploited by hundreds of attackers, including cryptocurrency miners, cybersecurity company Imperva says.
Cmd helps organizations monitor, authenticate, and block user activity that goes beyond expected Linux system usage.
Learn what a shell "builtin" on a Linux system is, as well as what commands identify builtins and allow you to retrieve useful information about your working environment. and how to determine if a command is one or if s Let's look....
Linux Cockpit is a web-based interface that provides graphical administrative access to a system. Here's a look at what it allows you to control.
A flaw in runC and Docker may allow access to underlying file systems when SELinux is not enabled.
Several commands report on how much memory is installed and being used on Linux systems. You can be deluged with details or get a quick and easy answer, depending on the command you use.
The watch, top, and ac commands provide some effective ways to oversee what is happening on your Linux servers.
Where can you find information on Linux updates performed with apt commands? Check the /var/log/apt directory.
There are quite a few interesting things that you can do with "zip" commands on Linux other than compress and uncompress files. Here are some other zip options and how they can help.
If you're gearing up to be a cybersecurity pro, you must have Linux skills. Linux Basics for Hackers will quickly get you up to speed.
ASLR is a memory exploitation mitigation technique used on both Linux and Windows systems. Learn how to tell if it's running, enable/disable it, and get a view of how it works.
Linux distributions provide quite a few useful commands for gauging disk activity. In this post, we'll look at some handy commands and useful options.
Thanks to the efforts of Sylabs, open-source containers are starting to focus on high-performance computing—providing new ways of working for enterprise IT organizations.
Learn how to create tarballs on Linux systems to back up and manage group files on Linux system.
Java has been one of the top two programming languages for the past 10 years. How has it stood the test of time? Good design and continuous innovation have a lot to do with it.
The Linux ss command replaces the older netstat and makes a lot of information about network connections available for you to easily examine.
Faster, more versatile and secure, Linux gets better every year. Let's take a look at some of the highlights expected in 2019.
The sudo command allows privileged users to run all or selected commands as root, but understanding how it works and doesn't work is a big help.
In the four years since the introduction of Red Hat Enterprise Linux (RHEL) 7, the IT world has evolved. RHEL 8 Beta brings innovation and dozens of new features.
IBM's purchase of Red Hat may be a good strategic fit for IBM, but the payback is anything but guaranteed.
Sierra -- the newest supercomputer and the second-fastest in the world -- runs Red Hat Enterprise Linux (RHEL), which isn't surprising given the role Linux plays in supercomputing in general.