- Core IT
- Business & Money
- Personal Tech
Member since: December 2011
Areas of Interest:
- Are you confident that all the accounts you manage are still required and still current? Or might some of them be ghost accounts that you should have blocked five years ago?
24 weeks 5 days ago
- Do you find yourself rewriting scripts because it's easier than finding or modifying your old ones? Do you find yourself spending far too much time reworking scripts when you need to make what seems like a small change? Let's look at how you can write scripts that are easier to reuse and easier to maintain.
25 weeks 5 days ago
- Want to tune your shell scripts to run more efficiently? Let's check out a few changes that might help them run faster.
26 weeks 5 days ago
- Secure connections can be even more secure or even less troublesome if you use a key pair and do it right.
27 weeks 4 days ago
- It's a new year and a great time to review what you're doing right and not so right in your Unix career. Time to commit to an effective to do list!
28 weeks 5 days ago
- Need a way to make connecting to lots of servers using different settings and usernames easier? Look no further than the ssh config file.
29 weeks 6 days ago
- Whether your aware of it or now, copyrighted or pornographic material on your work or personal computer can land you in jail or in the poor house.
30 weeks 4 days ago
- If you get a secret thrill out of a well crafted Perl one-liner, but only have a few that you can pull out of your mental pocket and use, this book may be just what Santa should be leaving under your tree!
31 weeks 4 days ago
- Sometimes what seems like the simplest of questions can have you scrambling for answers. Today's seemingly simple question is "How can a bash script identify its own location?"
32 weeks 5 days ago
- Sorting data numerically and alphanumerically isn't generally much of a challenge on Unix systems, but sometimes .5 is smaller than .11.
33 weeks 5 days ago
- Last week's post provided some tips and tricks for debugging scripts. This week's provides some even better ones!
34 weeks 5 days ago
- All kinds of things can go wrong with your shell scripts, but they don't have to. Let's look a some debugging tips that can help ensure your scripts run the way you intend.
35 weeks 6 days ago
- The kill command provides a lot more functionality than just terminating processes. You can use it to send any of more than 60 signals to processes and what happens next depends on the signal, the process and maybe even your settings.
36 weeks 4 days ago
- It's easy to find files on Unix systems. You can find them by almost any criteria that you can imagine. The bigger challenge is deciding how to describe what you're looking for and deciding what to do with the files once you find them.
37 weeks 3 days ago
- One of the most endearing qualities of Unix devotees is how determined they are to be as efficient as possible. Why type three characters if you can do the same thing with two? And one of the best ways to cut down keystrokes is to turn common commands into aliases.
38 weeks 3 days ago
- Unlike federal shutdowns, Unix shutdowns (and reboots) are generally smooth and easy, don't cost $24B and leave the system in better shape.
39 weeks 4 days ago
- Ever need to look into a Unix process to see exactly what it's doing? The ps and top commands only give you a bird's eye view of what's going on. But strace will let you peer into a process' inner workings.
40 weeks 3 days ago
- The CISSP is a valuable certification, but it takes a lot more than just your many years of experience to prepare for it. You will likely have to learn about a lot of technology and processes that you’ve never worked with, some of it not especially current and all of it a lot less vendor-specific than you’ve ever imagined.
41 weeks 4 days ago
- Oh, Danny Boy, the pipes, the pipes are calling. But if you want to call them back, you need to give them names.
42 weeks 4 days ago
Thanks, Fred! For the typo fix and for sharing the script. I hope all is well with you. :-)No matter how much disk space you add to a system, sooner or later you're going to run short. But watching disk space get slowly used up is a lot like watching grass grow. How do you avoid a disk space crisis and avoid being lulled into a data stupor?
43 weeks 4 days ago
- Sandra Henry-Stocker wrote Security: Book Review -- The Practice of Network Security Monitoring, Richard Bejtlich, no starch press, July 2013If you work in cyber security or incident response, you MUST read this book. It is the best book ever for preparing yourself and your staff for handling inevitable network intrusions.
43 weeks 4 days ago
- No matter how much disk space you add to a system, sooner or later you're going to run short. But watching disk space get slowly used up is a lot like watching grass grow. How do you avoid a disk space crisis and avoid being lulled into a data stupor?
44 weeks 3 days ago
- The only thing wrong with sed is that most of us barely grasp how powerful it is. We use it in pipes to change "this" to "that", but we rarely consider it for the big editing jobs where it could save us considerable time and effort -- especially when it comes to boring repetitious work.
45 weeks 3 days ago
- Moving files between Linux (and other) servers is a lot smarter and more versatile when you discover lftp.
46 weeks 4 days ago
- Log files on Unix systems can easily grow to hundreds of thousands or even millions of lines. Here's a simple way to pluck out every Nth line.
47 weeks 4 days ago