- Core IT
- Business & Money
- Personal Tech
Member since: April 2011
Areas of Interest:
- Want to tune your shell scripts to run more efficiently? Let's check out a few changes that might help them run faster.
25 weeks 1 day ago
- Secure connections can be even more secure or even less troublesome if you use a key pair and do it right.
26 weeks 16 hours ago
- It's a new year and a great time to review what you're doing right and not so right in your Unix career. Time to commit to an effective to do list!
27 weeks 1 day ago
- Need a way to make connecting to lots of servers using different settings and usernames easier? Look no further than the ssh config file.
28 weeks 2 days ago
- Whether your aware of it or now, copyrighted or pornographic material on your work or personal computer can land you in jail or in the poor house.
29 weeks 14 hours ago
- If you get a secret thrill out of a well crafted Perl one-liner, but only have a few that you can pull out of your mental pocket and use, this book may be just what Santa should be leaving under your tree!
30 weeks 14 hours ago
- Sometimes what seems like the simplest of questions can have you scrambling for answers. Today's seemingly simple question is "How can a bash script identify its own location?"
31 weeks 1 day ago
- Sorting data numerically and alphanumerically isn't generally much of a challenge on Unix systems, but sometimes .5 is smaller than .11.
32 weeks 1 day ago
- Last week's post provided some tips and tricks for debugging scripts. This week's provides some even better ones!
33 weeks 1 day ago
- All kinds of things can go wrong with your shell scripts, but they don't have to. Let's look a some debugging tips that can help ensure your scripts run the way you intend.
34 weeks 2 days ago
- The kill command provides a lot more functionality than just terminating processes. You can use it to send any of more than 60 signals to processes and what happens next depends on the signal, the process and maybe even your settings.
35 weeks 15 hours ago
- It's easy to find files on Unix systems. You can find them by almost any criteria that you can imagine. The bigger challenge is deciding how to describe what you're looking for and deciding what to do with the files once you find them.
35 weeks 6 days ago
- One of the most endearing qualities of Unix devotees is how determined they are to be as efficient as possible. Why type three characters if you can do the same thing with two? And one of the best ways to cut down keystrokes is to turn common commands into aliases.
36 weeks 6 days ago
- Unlike federal shutdowns, Unix shutdowns (and reboots) are generally smooth and easy, don't cost $24B and leave the system in better shape.
38 weeks 11 hours ago
- Ever need to look into a Unix process to see exactly what it's doing? The ps and top commands only give you a bird's eye view of what's going on. But strace will let you peer into a process' inner workings.
38 weeks 6 days ago
- The CISSP is a valuable certification, but it takes a lot more than just your many years of experience to prepare for it. You will likely have to learn about a lot of technology and processes that you’ve never worked with, some of it not especially current and all of it a lot less vendor-specific than you’ve ever imagined.
40 weeks 17 hours ago
- Oh, Danny Boy, the pipes, the pipes are calling. But if you want to call them back, you need to give them names.
41 weeks 18 hours ago
Thanks, Fred! For the typo fix and for sharing the script. I hope all is well with you. :-)No matter how much disk space you add to a system, sooner or later you're going to run short. But watching disk space get slowly used up is a lot like watching grass grow. How do you avoid a disk space crisis and avoid being lulled into a data stupor?
42 weeks 15 hours ago
- Sandra Henry-Stocker wrote Security: Book Review -- The Practice of Network Security Monitoring, Richard Bejtlich, no starch press, July 2013If you work in cyber security or incident response, you MUST read this book. It is the best book ever for preparing yourself and your staff for handling inevitable network intrusions.
42 weeks 16 hours ago
- No matter how much disk space you add to a system, sooner or later you're going to run short. But watching disk space get slowly used up is a lot like watching grass grow. How do you avoid a disk space crisis and avoid being lulled into a data stupor?
42 weeks 6 days ago
- The only thing wrong with sed is that most of us barely grasp how powerful it is. We use it in pipes to change "this" to "that", but we rarely consider it for the big editing jobs where it could save us considerable time and effort -- especially when it comes to boring repetitious work.
43 weeks 6 days ago
- Moving files between Linux (and other) servers is a lot smarter and more versatile when you discover lftp.
45 weeks 14 hours ago
- Log files on Unix systems can easily grow to hundreds of thousands or even millions of lines. Here's a simple way to pluck out every Nth line.
46 weeks 12 hours ago
- The things that make you love a job or drive you to thinking about moving on may have less to do with how much you earn than whether you look forward to Monday morning.
46 weeks 4 days ago
Good point, Thanks.You need to understanding routing tables if you're going to do any kind of network troubleshooting. Let's take a look at what Linux commands can tell you about how your system is making connections.
48 weeks 1 day ago