Sandra Henry-Stocker

Unix Dweeb

star Thought Leader IDG Contributor Network
Want to Join?
Opinions expressed by ICN authors are their own.

Sandra Henry-Stocker has been administering Unix systems for more than 30 years. She describes herself as "USL" (Unix as a second language) but remembers enough English to write books and buy groceries. She lives in the mountains in Virginia where, when not working with or writing about Unix, she's chasing the bears away from her bird feeders.

The opinions expressed in this blog are those of Sandra Henry-Stocker and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

How to quickly deploy, run Linux applications as unikernels

How to quickly deploy, run Linux applications as unikernels

Unikernels are a smaller, faster, and more secure option for deploying applications on cloud infrastructure. With NanoVMs OPS, anyone can run a Linux application as a unikernel with no additional coding.

How to manage your Linux environment

How to manage your Linux environment

Linux user environments simplify your use of the system in many ways. Viewing your settings and modifying them can be tricky, though. Here’s how to do it.

Tips for using the Ip command to print from Linux systems

Tips for using the Ip command to print from Linux systems

The lp command on Linux systems provides numerous options for printing, such as multiple pages per sheet and page borders, but also just a few quirks to keep you on your toes.

Printing from the Linux command line

Printing from the Linux command line

There's a lot more to printing from the Linux command line than the lp command. Check out some of the many available options.

How to configure a static IP address on Linux

How to configure a static IP address on Linux

When you need a Linux system to have a static IP address rather than one that is set dynamically, all that's required is some configuration changes and a restart. Follow these steps to make the switch.

Cryptocurrency miners exploit Docker flaw

Cryptocurrency miners exploit Docker flaw

A container flaw discovered just last month has been exploited by hundreds of attackers, including cryptocurrency miners, cybersecurity company Imperva says.

Linux security: Cmd provides visibility, control over user activity

Linux security: Cmd provides visibility, control over user activity

Cmd helps organizations monitor, authenticate, and block user activity that goes beyond expected Linux system usage.

How to identify shell builtins, aliases and executable files on Linux systems

How to identify shell builtins, aliases and executable files on Linux systems

Learn what a shell "builtin" on a Linux system is, as well as what commands identify builtins and allow you to retrieve useful information about your working environment. and how to determine if a command is one or if s Let's...

Sitting in the Linux cockpit

Sitting in the Linux cockpit

Linux Cockpit is a web-based interface that provides graphical administrative access to a system. Here's a look at what it allows you to control.

Red Hat announces container flaw CVE-2019-5736

Red Hat announces container flaw CVE-2019-5736

A flaw in runC and Docker may allow access to underlying file systems when SELinux is not enabled.

How much memory is installed and being used on your Linux systems?

How much memory is installed and being used on your Linux systems?

Several commands report on how much memory is installed and being used on Linux systems. You can be deluged with details or get a quick and easy answer, depending on the command you use.

The Linux command-line cheat sheet

The Linux command-line cheat sheet

This select set of Linux commands can help you master the command line and speed up your use of the operating system.

How to monitor activity on your Linux server

How to monitor activity on your Linux server

The watch, top, and ac commands provide some effective ways to oversee what is happening on your Linux servers.

Linux systems: Scraping up information about apt updates

Linux systems: Scraping up information about apt updates

Where can you find information on Linux updates performed with apt commands? Check the /var/log/apt directory.

Zipping files on Linux: the many variations and how to use them

Zipping files on Linux: the many variations and how to use them

There are quite a few interesting things that you can do with "zip" commands on Linux other than compress and uncompress files. Here are some other zip options and how they can help.

First step to becoming a cybersecurity pro: Linux

First step to becoming a cybersecurity pro: Linux

If you're gearing up to be a cybersecurity pro, you must have Linux skills. Linux Basics for Hackers will quickly get you up to speed.

How ASLR protects Linux systems from buffer overflow attacks

How ASLR protects Linux systems from buffer overflow attacks

ASLR is a memory exploitation mitigation technique used on both Linux and Windows systems. Learn how to tell if it's running, enable/disable it, and get a view of how it works.

Linux commands for measuring disk activity

Linux commands for measuring disk activity

Linux distributions provide quite a few useful commands for gauging disk activity. In this post, we'll look at some handy commands and useful options.

Open-source containers move toward high-performance computing

Open-source containers move toward high-performance computing

Thanks to the efforts of Sylabs, open-source containers are starting to focus on high-performance computing—providing new ways of working for enterprise IT organizations.

Working with tarballs on Linux

Working with tarballs on Linux

Learn how to create tarballs on Linux systems to back up and manage group files on Linux system.

Load More