Sandra Henry-Stocker

Unix Dweeb

star Thought Leader IDG Contributor Network
Want to Join?
Opinions expressed by ICN authors are their own.

Sandra Henry-Stocker has been administering Unix systems for more than 30 years. She describes herself as "USL" (Unix as a second language) but remembers enough English to write books and buy groceries. She lives in the mountains in Virginia where, when not working with or writing about Unix, she's chasing the bears away from her bird feeders.

The opinions expressed in this blog are those of Sandra Henry-Stocker and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Is the Linux 4.18 kernel heading your way?

Is the Linux 4.18 kernel heading your way?

The recently released 4.18 Linux kernel has already moved up to 4.18.5. How soon it lands on your system or network depends a lot on which Linux distributions you use.

How the L1 Terminal Fault vulnerability affects Linux systems

How the L1 Terminal Fault vulnerability affects Linux systems

The L1 Terminal Fault (L1TF) affects Intel processors and thereby Linux systems. Learn what this vulnerability is all about and what Linux users should do about it.

Examining partitions on Linux systems

Examining partitions on Linux systems

Linux systems provide many ways to look at disk partitions. Here's a look at commands you can use to display useful information -- each providing a different format and with a different focus.

How to display data in a human-friendly way on Linux

How to display data in a human-friendly way on Linux

Many Linux commands now have options to make their output a little easier to digest. Here's a look at some that bring out the friendliness of our favorite operating system.

How to query your Linux system kernel

How to query your Linux system kernel

What can your Linux system tell you about the Linux kernel it's using? Let's do a little probing and see.

How to use the gpg command to encrypt Linux files

How to use the gpg command to encrypt Linux files

Encryption commands such as gpg can be used to secure your most sensitive files on Linux systems.

Is it time to start climbing the ladder to Kubernetes?

Is it time to start climbing the ladder to Kubernetes?

If you aren't using Kubernetes, it’s probably a good time to familiarize yourself with a technology that is dramatically changing the way applications are being deployed today.

Examining Linux system performance with dstat

Examining Linux system performance with dstat

Dstat provides valuable insights into Linux system performance, pretty much replacing older tools, such as vmstat, netstat, iostat, and ifstat.

Converting and manipulating image files on the Linux command line

Converting and manipulating image files on the Linux command line

Using the convert command, you can modify image files without having to open an image editor.

The aftermath of the Gentoo GitHub hack

The aftermath of the Gentoo GitHub hack

A password guess and five days offline have left not only Gentoo's GitHub admins, but all of us, with some things to think about.

Is implementing and managing Linux applications becoming a snap?

Is implementing and managing Linux applications becoming a snap?

Learn what "snaps" are and why are they making the development and installation of Linux applications so trouble-free.

Shredding files on Linux

Shredding files on Linux

On Linux, files can be erased but still be recoverable. Here's what to do when you really want them gone.

Linux control sequence tricks

Linux control sequence tricks

There are a lot of control sequences available on Linux systems -- maybe even some you've never used.

Red Hat reaches the Summit – a new top scientific supercomputer

Red Hat reaches the Summit – a new top scientific supercomputer

The new supercomputer at Oak Ridge National Labs runs Red Hat Enterprise Linux and heralds a new level of cooperation between vendors.

Comparing files and directories with the diff and comm Linux commands

Comparing files and directories with the diff and comm Linux commands

The Linux comm command makes it easy to compare files or the contents of directories with its columnar output.

Copying and renaming files on Linux

Copying and renaming files on Linux

There's more to copying and renaming files on Linux than cp and mv. Try some commands and strategies that might surprise you and save you some time.

How to use logger on Linux

How to use logger on Linux

The logger command provides an easy way to add messages to the /var/log/syslog file from the command line or from other files.

22 essential Linux security commands

22 essential Linux security commands

If you're looking after the security of Linux systems, these are the commands you must know.

How to speak Linux

How to speak Linux

We might all agree on the command line, but start talking about Linux, and we might find that the rules of how to pronounce the names of Unix commands are not universal.

Blacklisting modules on Linux

Blacklisting modules on Linux

Blacklisting modules prevents them from being loaded and used, and it is sometimes an important step in keeping a system running properly.

Load More