Sandra Henry-Stocker

Unix Dweeb

star Thought Leader IDG Contributor Network
Want to Join?
Opinions expressed by ICN authors are their own.

Sandra Henry-Stocker has been administering Unix systems for more than 30 years. She describes herself as "USL" (Unix as a second language) but remembers enough English to write books and buy groceries. She lives in the mountains in Virginia where, when not working with or writing about Unix, she's chasing the bears away from her bird feeders.

The opinions expressed in this blog are those of Sandra Henry-Stocker and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

7 ways to remember Linux commands

Breaking Linux files into pieces with the split command

Breaking Linux files into pieces with the split command

Some simple Linux commands allow you to break files into pieces and reassemble them as needed. In this post, we'll look at the split command and some of its more useful options.

Counting down the days using bash

Counting down the days using bash

Need to know how many days there are before some important event? Let bash and the date command help with that!

Displaying dates and times your way in Linux

Displaying dates and times your way in Linux

The Linux date command provides more options for displaying dates and times than you can shake a stick at (without hurting your wrist anyway). Here are some of the more useful choices.

The many faces of awk

The many faces of awk

The awk command provides a lot more than simply selecting fields from input strings, including pulling out columns of data, printing simple text evaluating content – even doing math.

Cleaning up with apt-get

Cleaning up with apt-get

Most of us with Debian-based systems use apt-get routinely to install packages and upgrades, but how often do we pull out the cleaning tools? Let's check out some of the tool's options for cleaning up after itself.

Red Hat Responds to Zombieload v2

Red Hat Responds to Zombieload v2

Red Hat calls for updating Linux software to address Intel processor flaws that can lead to data-theft exploits

Red Hat announces RHEL 8.1 with predictable release cadence

Red Hat announces RHEL 8.1 with predictable release cadence

Red Hat has just released Red Hat Enterprise Linux 8.1, first to follow the predictable release cadence promised at Red Hat Summit 2019

Looping your way through bash

Looping your way through bash

There are many ways to loop through data in a bash script and on the command line. Which way is best depends on what you're trying to do.

Viewing network bandwidth usage with bmon

Viewing network bandwidth usage with bmon

Introducing bmon, a monitoring and debugging tool that captures network statistics and makes them easily digestible.

Using multitail on Linux

Using multitail on Linux

Multitail allows you to watch multiple files as they are being updated -- like a split-window tail -f display. Let's check out how you can use it to monitor system activity and your files.

Linux sudo flaw can lead to unauthorized privileges

Linux sudo flaw can lead to unauthorized privileges

Exploiting a newly discovered sudo flaw in Linux can enable certain users with to run commands as root despite restrictions against it.

Load More