Advice for everyday Unix systems administration and some clever ways to approach more challenging problems.
Dstat provides valuable insights into Linux system performance, pretty much replacing older tools, such as vmstat, netstat, iostat, and ifstat.
Using the convert command, you can modify image files without having to open an image editor.
A password guess and five days offline have left not only Gentoo's GitHub admins, but all of us, with some things to think about.
Learn what "snaps" are and why are they making the development and installation of Linux applications so trouble-free.
On Linux, files can be erased but still be recoverable. Here's what to do when you really want them gone.
There are a lot of control sequences available on Linux systems -- maybe even some you've never used.
The new supercomputer at Oak Ridge National Labs runs Red Hat Enterprise Linux and heralds a new level of cooperation between vendors.
The Linux comm command makes it easy to compare files or the contents of directories with its columnar output.
There's more to copying and renaming files on Linux than cp and mv. Try some commands and strategies that might surprise you and save you some time.
The logger command provides an easy way to add messages to the /var/log/syslog file from the command line or from other files.
We might all agree on the command line, but start talking about Linux, and we might find that the rules of how to pronounce the names of Unix commands are not universal.
Blacklisting modules prevents them from being loaded and used, and it is sometimes an important step in keeping a system running properly.
The colors used on the Linux command line are intended to provide an easy way to identify files by type. You can change them, but you should have a good reason before you do.
Cisco shares have risen nearly 20 percent in 2018, making it the best performer in the Dow. What changes have energized this surprising push to the top of tech?
In spite of the huge differences between Linux and Windows, sharing files between the systems is surprisingly easy. Here’s a look at two very different ways to make this happen.
How to use the expr, factor, jot, and bc commands to do math calculations on Linux systems.
How to use the find, locate, mlocate, which, whereis, whatis, and apropos commands to find files on Linux systems.
A new version of the Fedora Linux distro, Fedora 28, was released in its beta version. Here's a look at some of its new features.
Some see a lot of promise in the evolution of "fish" on Linux -- a shell with a some unusual behaviors.
With calendars on Linux, you can get more than just reminders of what day it is. Commands such as date, cal, ncal and calendar provide helpful information.
The "last" command provides some easy ways to see who has been logging into your system and when, but with a little more work, you can ask it to report on a specific time period.
Ava from Ava Robotics, a startup with deep technical ties to iRobot, brings her charming personality to the telepresence marketplace.
The ip command provides a lot of information on network interfaces. Here's some advice to help you understand what it's telling you.
Linux command history is not just about repeating commands. You can selectively decide what to remember and whether to record the date and time your commands were used.
Some Linux commands recurse without being asked, while others have to be nudged with just the right option. Here are some ways to use it to make you tasks easier.
When the Linux kernel detects something on the system violated the kernel's rules about proper behavior, it will shut the system down and issue an "oops."
Support for container technology deriving from Lawrence Berkeley National Lab is getting a boost in enterprise and commercial markets through the formation of a new company, Sylabs.
The Linux ranger is a file manager that works in a terminal window and provides a smooth way to view and edit files.
Named pipes aren't used all that often, but they provide some interesting options for inter-process communications.
Joe Brockmeier, a senior evangelist at Red Hat, explains the benefits of containers on Linux, how they work and how to prepare to use them.
IT leaders are under increased pressure to ensures systems can withstand natural disasters, attacks, and increasing storage and data accessibility needs.
Available this summer, the new BeamPro 2 promises more realistic telepresence visits with colleagues, customers, patients and others.
>How are the Linux vendors addressing the recently-exposed Intel processor flaw? I asked Red Hat and got some solid answers.
New Year's resolutions for Linux admins and users
ASCII plays a much more important role on our systems than generating techno-art. Let's explore the commands that allow you to see how it works.
Learn how to easily extract content from compressed Linux files — without having to memorize a suite of syntactical options
Some of the most useful commands for gaining insights into the packages installed on your Linux system — Debian style
Linux systems offer lots of options for compressing files. Here's some advice for choosing the ones best for you.
Helping to usher in the Industry 4.0 era, NXP Semiconductors announced OpenIL, a Linux distribution meant for smart factory automation.
Creating command groups in /etc/sudoers can make managing user privileges easier and smarter.
Some helpful hints for using sudo — the command that allows admins to administer user system privileges
To remain relevant — and employed — not only do you have to keep your skills up to date, but you might have to embrace the IoT explosion.
Suitable Technologies' Beam telepresence systems elevate remote meetings and interaction with remote staff and customers.
What Linux commands bring up visions of monsters and ghosts? Let’s look and see!
How to use the ip, ethtool, traceroute, tcptraceroute, and tcpdump commands to see what's up with your network on Linux systems.
To make sure files aren't removed accidentally when running the Linux find command, use the -ok command. It will ask for permission before removing any files.
Ping commands are useful, but would-be attackers often use them to identify systems. To prevent that, we show you how to get your system to ignore these requests.
The /proc file system provides amazingly detailed views into your processes and your system's guts.
There are many clever ways to hunt down files on Linux systems. Here's a look at the most useful commands and options.
Sponsored Links