Sandra Henry-Stocker

Unix Dweeb

star Thought Leader IDG Contributor Network
Want to Join?
Opinions expressed by ICN authors are their own.

Sandra Henry-Stocker has been administering Unix systems for more than 30 years. She describes herself as "USL" (Unix as a second language) but remembers enough English to write books and buy groceries. She lives in the mountains in Virginia where, when not working with or writing about Unix, she's chasing the bears away from her bird feeders.

The opinions expressed in this blog are those of Sandra Henry-Stocker and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Undo releases Live Recorder 5.0 for Linux debugging

Undo releases Live Recorder 5.0 for Linux debugging

Debugging on multi-process systems just got significantly easier with the release of Live Recorder 5.0 from Undo.

Tracking down library injections on Linux

Tracking down library injections on Linux

Library injections are less common on Linux than they are on Windows, but they're still a problem. Here's a look at how they work and how to identify them.

Exploring /run on Linux

Exploring /run on Linux

There's been a small but significant change in how Linux systems work with respect to runtime data. Here's an overview of the change to /run.

How to send email from the Linux command line

How to send email from the Linux command line

Linux offers several commands that allow you to send email from the command line. Here's look at some that offer interesting options.

How Linux can help with your spelling

How Linux can help with your spelling

Whether you're struggling with one elusive word or checking a report before you send it off to your boss, Linux can help with your spelling.

NVMe on Linux

NVMe on Linux

In case you haven't yet noticed, some incredibly fast solid-state disk technology is as available for Linux as it is for other operating systems.

A deeper dive into Linux permissions

A deeper dive into Linux permissions

Sometimes you see more than just the ordinary r, w, x and - designations when looking at file permissions on Linux. How can you get a clearer view of what the uncommon charactrers are trying to tell you and how do these permissions...

4 vulnerabilities and exposures affect Intel-based systems; Red Hat responds

4 vulnerabilities and exposures affect Intel-based systems; Red Hat responds

Red Hat issued a security advisory on recently disclosed CVEs (common vulnerabilities and exposures) in Intel microprocessors.

When to be concerned about memory levels on Linux

When to be concerned about memory levels on Linux

Memory management on Linux systems is complicated. Seeing high usage doesn’t necessarily mean there’s a problem. There are other things you should also consider.

Red Hat Summit 2019: RHEL 8 arrives

Red Hat Summit 2019: RHEL 8 arrives

At Red Hat Summit 2019, Red Hat announced the availability of Red Hat Enterprise Linux (RHEL) 8, with support for the Red Hat Container Toolkit, and the Universal Base Image.

Looking into Linux modules

Looking into Linux modules

The lsmod command can tell you which kernel modules are currently loaded on your system, along with some interesting details about their use.

How to identify same-content files on Linux

How to identify same-content files on Linux

Copies of files sometimes represent a big waste of disk space and can cause confusion if you want to make updates. Here are six Linux commands to help you identify these files.

How to identify duplicate files on Linux

How to identify duplicate files on Linux

Some files on a Linux system can appear in more than one location. Follow these instructions to find and identify these "identical twins" and learn why hard links can be so advantageous.

Working with variables on Linux

Working with variables on Linux

Variables often look like $var, but they also look like $1, $*, $? and $$. Let's take a look at what all these $ values can tell you.

How to quickly deploy, run Linux applications as unikernels

How to quickly deploy, run Linux applications as unikernels

Unikernels are a smaller, faster, and more secure option for deploying applications on cloud infrastructure. With NanoVMs OPS, anyone can run a Linux application as a unikernel with no additional coding.

How to manage your Linux environment

How to manage your Linux environment

Linux user environments simplify your use of the system in many ways. Viewing your settings and modifying them can be tricky, though. Here’s how to do it.

Tips for using the Ip command to print from Linux systems

Tips for using the Ip command to print from Linux systems

The lp command on Linux systems provides numerous options for printing, such as multiple pages per sheet and page borders, but also just a few quirks to keep you on your toes.

Printing from the Linux command line

Printing from the Linux command line

There's a lot more to printing from the Linux command line than the lp command. Check out some of the many available options.

How to configure a static IP address on Linux

How to configure a static IP address on Linux

When you need a Linux system to have a static IP address rather than one that is set dynamically, all that's required is some configuration changes and a restart. Follow these steps to make the switch.

Cryptocurrency miners exploit Docker flaw

Cryptocurrency miners exploit Docker flaw

A container flaw discovered just last month has been exploited by hundreds of attackers, including cryptocurrency miners, cybersecurity company Imperva says.

Load More