Advice for everyday Unix systems administration and some clever ways to approach more challenging problems.
Red Hat issued a security advisory on recently disclosed CVEs (common vulnerabilities and exposures) in Intel microprocessors.
Memory management on Linux systems is complicated. Seeing high usage doesn’t necessarily mean there’s a problem. There are other things you should also consider.
At Red Hat Summit 2019, Red Hat announced the availability of Red Hat Enterprise Linux (RHEL) 8, with support for the Red Hat Container Toolkit, and the Universal Base Image.
The lsmod command can tell you which kernel modules are currently loaded on your system, along with some interesting details about their use.
Copies of files sometimes represent a big waste of disk space and can cause confusion if you want to make updates. Here are six Linux commands to help you identify these files.
Some files on a Linux system can appear in more than one location. Follow these instructions to find and identify these "identical twins" and learn why hard links can be so advantageous.
Variables often look like $var, but they also look like $1, $*, $? and $$. Let's take a look at what all these $ values can tell you.
Unikernels are a smaller, faster, and more secure option for deploying applications on cloud infrastructure. With NanoVMs OPS, anyone can run a Linux application as a unikernel with no additional coding.
Linux user environments simplify your use of the system in many ways. Viewing your settings and modifying them can be tricky, though. Here’s how to do it.
The lp command on Linux systems provides numerous options for printing, such as multiple pages per sheet and page borders, but also just a few quirks to keep you on your toes.
When you need a Linux system to have a static IP address rather than one that is set dynamically, all that's required is some configuration changes and a restart. Follow these steps to make the switch.
A container flaw discovered just last month has been exploited by hundreds of attackers, including cryptocurrency miners, cybersecurity company Imperva says.
Cmd helps organizations monitor, authenticate, and block user activity that goes beyond expected Linux system usage.
Learn what a shell "builtin" on a Linux system is, as well as what commands identify builtins and allow you to retrieve useful information about your working environment. and how to determine if a command is one or if s Let's look....
Linux Cockpit is a web-based interface that provides graphical administrative access to a system. Here's a look at what it allows you to control.
A flaw in runC and Docker may allow access to underlying file systems when SELinux is not enabled.
Several commands report on how much memory is installed and being used on Linux systems. You can be deluged with details or get a quick and easy answer, depending on the command you use.
The watch, top, and ac commands provide some effective ways to oversee what is happening on your Linux servers.
Where can you find information on Linux updates performed with apt commands? Check the /var/log/apt directory.
There are quite a few interesting things that you can do with "zip" commands on Linux other than compress and uncompress files. Here are some other zip options and how they can help.
If you're gearing up to be a cybersecurity pro, you must have Linux skills. Linux Basics for Hackers will quickly get you up to speed.
ASLR is a memory exploitation mitigation technique used on both Linux and Windows systems. Learn how to tell if it's running, enable/disable it, and get a view of how it works.
Linux distributions provide quite a few useful commands for gauging disk activity. In this post, we'll look at some handy commands and useful options.
Thanks to the efforts of Sylabs, open-source containers are starting to focus on high-performance computing—providing new ways of working for enterprise IT organizations.
Learn how to create tarballs on Linux systems to back up and manage group files on Linux system.
Java has been one of the top two programming languages for the past 10 years. How has it stood the test of time? Good design and continuous innovation have a lot to do with it.
The Linux ss command replaces the older netstat and makes a lot of information about network connections available for you to easily examine.
Faster, more versatile and secure, Linux gets better every year. Let's take a look at some of the highlights expected in 2019.
The sudo command allows privileged users to run all or selected commands as root, but understanding how it works and doesn't work is a big help.
In the four years since the introduction of Red Hat Enterprise Linux (RHEL) 7, the IT world has evolved. RHEL 8 Beta brings innovation and dozens of new features.
IBM's purchase of Red Hat may be a good strategic fit for IBM, but the payback is anything but guaranteed.
Sierra -- the newest supercomputer and the second-fastest in the world -- runs Red Hat Enterprise Linux (RHEL), which isn't surprising given the role Linux plays in supercomputing in general.
IBM says Red Hat will continue to be a contributor to the open-source community and that Red Hat will continue its commitments with current partners even after IBM buys the company for 34 billion in the second half of 2019.
The latest and greatest release of Canonical's Ubuntu, nicknamed "Cosmic Cuttlefish" became available just recently. Images are available for all major public clouds. In addition, it provides improved gaming performance, a huge array o....
While nmap is generally used to probe business networks and perform security reviews, the tool can also provide interesting details on your systems and devices at home.
Red Hat's new vice president and general manager of its RHEL Business Unit, Stefanie Chiras, enthusiastically embraces the growing importance of Linux.
Log files on Linux can provide a lot of useful information on what's happening on your system. These commands can help you sort through the data and pinpoint problems.
Open source networking has become the "new norm," and many at the recent Open Networking Summit Europe said they’re seeing it play out in the industry.
The Fedora 29 beta release is ready for downloading and testing, including new support for containers and better performance on Arm machines.
Installing the Rust programming language on your Linux systems could turn out to be one of the more rewarding things you've done in years.
Use these commands to get insights on repositories that contain OS updates and applications and how that information is stored on your Linux system.
Some command line tricks can make you even more productive on the Linux command line.
How to take a list of names, addresses, phone numbers and email addresses and turn it into a Google map.
The recently released 4.18 Linux kernel has already moved up to 4.18.5. How soon it lands on your system or network depends a lot on which Linux distributions you use.
The L1 Terminal Fault (L1TF) affects Intel processors and thereby Linux systems. Learn what this vulnerability is all about and what Linux users should do about it.
Linux systems provide many ways to look at disk partitions. Here's a look at commands you can use to display useful information -- each providing a different format and with a different focus.
Many Linux commands now have options to make their output a little easier to digest. Here's a look at some that bring out the friendliness of our favorite operating system.
What can your Linux system tell you about the Linux kernel it's using? Let's do a little probing and see.
Encryption commands such as gpg can be used to secure your most sensitive files on Linux systems.
If you aren't using Kubernetes, it’s probably a good time to familiarize yourself with a technology that is dramatically changing the way applications are being deployed today.
Sponsored Links