Sandra Henry-Stocker

Unix Dweeb

star Thought Leader IDG Contributor Network
Want to Join?
Opinions expressed by ICN authors are their own.

Sandra Henry-Stocker has been administering Unix systems for more than 30 years. She describes herself as "USL" (Unix as a second language) but remembers enough English to write books and buy groceries. She lives in the mountains in Virginia where, when not working with or writing about Unix, she's chasing the bears away from her bird feeders.

The opinions expressed in this blog are those of Sandra Henry-Stocker and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Sitting in the Linux cockpit

Red Hat announces container flaw CVE-2019-5736

Red Hat announces container flaw CVE-2019-5736

A flaw in runC and Docker may allow access to underlying file systems when SELinux is not enabled.

How much memory is installed and being used on your Linux systems?

How much memory is installed and being used on your Linux systems?

Several commands report on how much memory is installed and being used on Linux systems. You can be deluged with details or get a quick and easy answer, depending on the command you use.

The Linux command-line cheat sheet

The Linux command-line cheat sheet

This select set of Linux commands can help you master the command line and speed up your use of the operating system.

How to monitor activity on your Linux server

How to monitor activity on your Linux server

The watch, top, and ac commands provide some effective ways to oversee what is happening on your Linux servers.

Linux systems: Scraping up information about apt updates

Linux systems: Scraping up information about apt updates

Where can you find information on Linux updates performed with apt commands? Check the /var/log/apt directory.

Zipping files on Linux: the many variations and how to use them

Zipping files on Linux: the many variations and how to use them

There are quite a few interesting things that you can do with "zip" commands on Linux other than compress and uncompress files. Here are some other zip options and how they can help.

First step to becoming a cybersecurity pro: Linux

First step to becoming a cybersecurity pro: Linux

If you're gearing up to be a cybersecurity pro, you must have Linux skills. Linux Basics for Hackers will quickly get you up to speed.

How ASLR protects Linux systems from buffer overflow attacks

How ASLR protects Linux systems from buffer overflow attacks

ASLR is a memory exploitation mitigation technique used on both Linux and Windows systems. Learn how to tell if it's running, enable/disable it, and get a view of how it works.

Linux commands for measuring disk activity

Linux commands for measuring disk activity

Linux distributions provide quite a few useful commands for gauging disk activity. In this post, we'll look at some handy commands and useful options.

Open-source containers move toward high-performance computing

Open-source containers move toward high-performance computing

Thanks to the efforts of Sylabs, open-source containers are starting to focus on high-performance computing—providing new ways of working for enterprise IT organizations.

Working with tarballs on Linux

Working with tarballs on Linux

Learn how to create tarballs on Linux systems to back up and manage group files on Linux system.

Load More