administration

0

Linux File Linking Explained: Hard vs. Soft Links

http://techthrob.com

In Linux, there are two types of file links: hardlinks and softlinks. This article shows the difference between hard and soft links, how they work, and explains when you should pick a softlink over a hardlink.

Read more »
nemilar's picture
Created by nemilar 14 years 1 week ago – Made popular 14 years 1 week ago
Category: Beginner   Tags:
0

How To Monitor Network Traffic: Two Indispensable Commands

http://techthrob.com

This how-to will teach you two commands, iftop and nethogs, that you can use to monitor network traffic on a Linux machine. You can use iftop to view traffic by individual connection, port, network segment, or remote host, which gives you a detailed accounting of all packets coming in and out of your machine.

Read more »
nemilar's picture
Created by nemilar 14 years 10 weeks ago – Made popular 14 years 10 weeks ago
Category: High End   Tags:
0

Malta's directive to boost uptake of open source

http://www.osor.eu

Malta's public administration wants its institutions to increase their use of open source software. In a directive published early last week, the government says it also wants to share more of its own applications by publishing them using the European Union's open source licence.

Read more »
stargrave's picture
Created by stargrave 14 years 17 weeks ago – Made popular 14 years 16 weeks ago
Category: Government   Tags:
0

How I sped up my server by a factor of 6 (with one linux command)

http://mailinator.blogspot.com

It occurred to me that I was running 3 CPU-bound processes on the same machine and that the processes might be stepping on each other's toes. It's possible that if the server is running on core 4 one second and the producer is running there the next, the level 1 cache of that core could be ruined for the server the next time it ambles over there.

Read more »
innerphaze's picture
Created by innerphaze 14 years 17 weeks ago – Made popular 14 years 17 weeks ago
Category: High End   Tags:
0

[Howto] Introduction to Puppet

http://blog.credativ.com

The administration of a large number of servers can be quite tiresome without a central configuration management. This article gives a first introduction into the configuration management Puppet.

Introduction

Read more »
liquidat's picture
Created by liquidat 14 years 30 weeks ago – Made popular 14 years 30 weeks ago
Category: High End   Tags:
0

Secure remote firewall administration via SSH

http://blogs.techrepublic.com.com

Most firewall systems contain a Web-based component that allows you to configure the firewall. This holds true for most entry-level firewall systems (Linksys, D-Link, etc.) and also open source firewall systems such as pfSense. These systems tend to provide ways to access the Web interface remotely via the Internet; however, this should not be considered secure at all.

Read more »
Ubuntu87's picture
Created by Ubuntu87 15 years 8 weeks ago – Made popular 15 years 8 weeks ago
Category: High End   Tags:
0

3 More Things Every Good Linux Adminstrator Knows

http://www.daniweb.com

Since my "5 Things Every Good Linux Administrator Knows" post the other day, I've received some indirect feedback from friends and readers alike, that admittedly, leaves a little egg on my face.

Read more »
bridget's picture
Created by bridget 15 years 46 weeks ago – Made popular 15 years 46 weeks ago
Category: High End   Tags:
0

Linux and Unix Admin Humor - The Web Site Is Down!

http://linuxshellaccount.blogspot.com

Great video, and actual website, of another BOFH :)

Read more »
eggixyz's picture
Created by eggixyz 16 years 7 weeks ago – Made popular 16 years 7 weeks ago
Category: Beginner   Tags:
0

Lazy Linux: 10 essential tricks for admins

http://www.ibm.com

Learn these 10 tricks and you'll be the most powerful Linux® systems administrator in the universe...well, maybe not the universe, but you will need these tips to play in the big leagues. Learn about SSH tunnels, VNC, password recovery, console spying, and more. Examples accompany each trick, so you can duplicate them on your own systems.

Read more »
serdar's picture
Created by serdar 16 years 10 weeks ago – Made popular 16 years 10 weeks ago
Category: High End   Tags:
0

Installation Security Baselines For Linux and Unix - 1b

http://linuxshellaccount.blogspot.com

Part two of a five part post series on setting up Linux and Unix servers securely.

Read more »
eggixyz's picture
Created by eggixyz 16 years 15 weeks ago – Made popular 16 years 15 weeks ago
Category: Beginner   Tags:
0

UID and GID: the basics of Linux user admin

http://www.itwire.com

It is important to understand how Linux user accounts work. There are GUI tools for this within GNOME and KDE but here we lift the lid on the bonnet to show what really makes a user exist, and what these commands are doing to your filesystem.

Read more »
dave's picture
Created by dave 17 years 3 weeks ago – Made popular 17 years 3 weeks ago
Category: End User   Tags:

Best karma users