How to identify duplicate files on Linux

How to identify duplicate files on Linux

Some files on a Linux system can appear in more than one location. Follow these instructions to find and identify these "identical twins" and learn why hard links can be so advantageous.

04/15/2019

Working with variables on Linux

Working with variables on Linux

Variables often look like $var, but they also look like $1, $*, $? and $$. Let's take a look at what all these $ values can tell you.

04/09/2019

How to quickly deploy, run Linux applications as unikernels

How to quickly deploy, run Linux applications as unikernels

Unikernels are a smaller, faster, and more secure option for deploying applications on cloud infrastructure. With NanoVMs OPS, anyone can run a Linux application as a unikernel with no additional coding.

04/08/2019

How to manage your Linux environment

How to manage your Linux environment

Linux user environments simplify your use of the system in many ways. Viewing your settings and modifying them can be tricky, though. Here’s how to do it.

03/29/2019

Tips for using the Ip command to print from Linux systems

Tips for using the Ip command to print from Linux systems

The lp command on Linux systems provides numerous options for printing, such as multiple pages per sheet and page borders, but also just a few quirks to keep you on your toes.

03/25/2019

Printing from the Linux command line

Printing from the Linux command line

There's a lot more to printing from the Linux command line than the lp command. Check out some of the many available options.

03/20/2019

How to configure a static IP address on Linux

How to configure a static IP address on Linux

When you need a Linux system to have a static IP address rather than one that is set dynamically, all that's required is some configuration changes and a restart. Follow these steps to make the switch.

03/05/2019

Cryptocurrency miners exploit Docker flaw

Cryptocurrency miners exploit Docker flaw

A container flaw discovered just last month has been exploited by hundreds of attackers, including cryptocurrency miners, cybersecurity company Imperva says.

03/05/2019

Linux security: Cmd provides visibility, control over user activity

Linux security: Cmd provides visibility, control over user activity

Cmd helps organizations monitor, authenticate, and block user activity that goes beyond expected Linux system usage.

02/26/2019

How to identify shell builtins, aliases and executable files on Linux systems

How to identify shell builtins, aliases and executable files on Linux systems

Learn what a shell "builtin" on a Linux system is, as well as what commands identify builtins and allow you to retrieve useful information about your working environment. and how to determine if a command is one or if s Let's...

02/21/2019

Sitting in the Linux cockpit

Sitting in the Linux cockpit

Linux Cockpit is a web-based interface that provides graphical administrative access to a system. Here's a look at what it allows you to control.

02/13/2019

Red Hat announces container flaw CVE-2019-5736

Red Hat announces container flaw CVE-2019-5736

A flaw in runC and Docker may allow access to underlying file systems when SELinux is not enabled.

02/11/2019

How much memory is installed and being used on your Linux systems?

How much memory is installed and being used on your Linux systems?

Several commands report on how much memory is installed and being used on Linux systems. You can be deluged with details or get a quick and easy answer, depending on the command you use.

02/07/2019

How to monitor activity on your Linux server

How to monitor activity on your Linux server

The watch, top, and ac commands provide some effective ways to oversee what is happening on your Linux servers.

01/23/2019

Linux systems: Scraping up information about apt updates

Linux systems: Scraping up information about apt updates

Where can you find information on Linux updates performed with apt commands? Check the /var/log/apt directory.

01/18/2019

Zipping files on Linux: the many variations and how to use them

Zipping files on Linux: the many variations and how to use them

There are quite a few interesting things that you can do with "zip" commands on Linux other than compress and uncompress files. Here are some other zip options and how they can help.

01/16/2019

First step to becoming a cybersecurity pro: Linux

First step to becoming a cybersecurity pro: Linux

If you're gearing up to be a cybersecurity pro, you must have Linux skills. Linux Basics for Hackers will quickly get you up to speed.

01/12/2019

How ASLR protects Linux systems from buffer overflow attacks

How ASLR protects Linux systems from buffer overflow attacks

ASLR is a memory exploitation mitigation technique used on both Linux and Windows systems. Learn how to tell if it's running, enable/disable it, and get a view of how it works.

01/08/2019

Linux commands for measuring disk activity

Linux commands for measuring disk activity

Linux distributions provide quite a few useful commands for gauging disk activity. In this post, we'll look at some handy commands and useful options.

12/27/2018

Open-source containers move toward high-performance computing

Open-source containers move toward high-performance computing

Thanks to the efforts of Sylabs, open-source containers are starting to focus on high-performance computing—providing new ways of working for enterprise IT organizations.

12/18/2018

Load More