In Linux, there are two types of file links: hardlinks and softlinks. This article shows the difference between hard and soft links, how they work, and explains when you should pick a softlink over a hardlink.
Read more »Linux File Linking Explained: Hard vs. Soft Links
- Login to post comments
How To Monitor Network Traffic: Two Indispensable Commands
This how-to will teach you two commands, iftop and nethogs, that you can use to monitor network traffic on a Linux machine. You can use iftop to view traffic by individual connection, port, network segment, or remote host, which gives you a detailed accounting of all packets coming in and out of your machine.
Read more »Malta's directive to boost uptake of open source
Malta's public administration wants its institutions to increase their use of open source software. In a directive published early last week, the government says it also wants to share more of its own applications by publishing them using the European Union's open source licence.
Read more »Category: Government Tags:
- Login to post comments
How I sped up my server by a factor of 6 (with one linux command)
It occurred to me that I was running 3 CPU-bound processes on the same machine and that the processes might be stepping on each other's toes. It's possible that if the server is running on core 4 one second and the producer is running there the next, the level 1 cache of that core could be ruined for the server the next time it ambles over there.
Read more »Category: High End Tags:
[Howto] Introduction to Puppet
The administration of a large number of servers can be quite tiresome without a central configuration management. This article gives a first introduction into the configuration management Puppet.
Introduction
Read more »Secure remote firewall administration via SSH
Most firewall systems contain a Web-based component that allows you to configure the firewall. This holds true for most entry-level firewall systems (Linksys, D-Link, etc.) and also open source firewall systems such as pfSense. These systems tend to provide ways to access the Web interface remotely via the Internet; however, this should not be considered secure at all.
Read more »Category: High End Tags:
- Login to post comments
3 More Things Every Good Linux Adminstrator Knows
Since my "5 Things Every Good Linux Administrator Knows" post the other day, I've received some indirect feedback from friends and readers alike, that admittedly, leaves a little egg on my face.
Read more »Category: High End Tags:
- Login to post comments
Linux and Unix Admin Humor - The Web Site Is Down!
Great video, and actual website, of another BOFH :)
Read more »Category: Beginner Tags:
- Login to post comments
Lazy Linux: 10 essential tricks for admins
Learn these 10 tricks and you'll be the most powerful Linux® systems administrator in the universe...well, maybe not the universe, but you will need these tips to play in the big leagues. Learn about SSH tunnels, VNC, password recovery, console spying, and more. Examples accompany each trick, so you can duplicate them on your own systems.
Read more »Category: High End Tags:
- Login to post comments
Installation Security Baselines For Linux and Unix - 1b
Part two of a five part post series on setting up Linux and Unix servers securely.
Read more »Category: Beginner Tags:
- Login to post comments
UID and GID: the basics of Linux user admin
It is important to understand how Linux user accounts work. There are GUI tools for this within GNOME and KDE but here we lift the lid on the bonnet to show what really makes a user exist, and what these commands are doing to your filesystem.
Read more »- Login to post comments