Profile

zuzi04

zuzi04

Member since: May 2012

Areas of Interest: Cloud Computing, Networking, Software, Virtualization

Activity

No records.

Friends' Activity

  • The things that make you love a job or drive you to thinking about moving on may have less to do with how much you earn than whether you look forward to Monday morning.

    47 weeks 6 days ago

  • You need to understanding routing tables if you're going to do any kind of network troubleshooting. Let's take a look at what Linux commands can tell you about how your system is making connections.

    49 weeks 2 days ago

  • Sitting in a chair for 40 or more hours a week might seem like the makings of a good life if it's combined with an impressive salary, but if you value your health and/or your career, you might rethink your priorities. This invaluable book could add years to your life and keep you feeling good well into retirement. Let me repeat that. This invaluable book ...

    49 weeks 2 days ago

  • You need to understanding routing tables if you're going to do any kind of network troubleshooting. Let's take a look at what Linux commands can tell you about how your system is making connections.

    50 weeks 2 days ago

  • Friday, July 26th,2013 is Sysadmin Day or "Systems Administrator Appreciation Day" -- a good reason to celebrate those individuals who devote themselves to keeping our servers available, usable and secure, but how do you go about thanking these geeky superheroes? First, you have to disentangle them from whatever tasks they're currently juggling and then you have to get and hold their attention long enough to express your appreciation.

    51 weeks 5 days ago

  • Firewall logs. There's never enough time to review them, but you can't ignore them. Here's one way to look for malicious connections without spending a lot of time at it.

    1 year 2 days ago

  • CSV (comma-separated values) files represent a common standard for transmitting data between applications. Like the more generic "flat files", each line in a CSV file represents a record. Exporting or importing data from and to applications such as Excel in CSV format is standard practice for a lot of applications. Hand a CSV file to a tool such as awk, however, and you may run into some problems. Let's look at the problems and at a handy Perl module that takes the stress out of working with CSV files on Unix systems.

    1 year 1 week ago

  • The grep command has a lot more options and "flavors" than the casual command line pioneer might expect, but there are some options and limitations that you should know about when you're working with big data files.

    1 year 2 weeks ago

  • Big data may be a tech buzzword of the moment, but Unix admins who need to hunt through logs to figure out what's going with their systems have been grappling with huge data sets for decades. Here are tips on command-line tools and techniques that can make sense of seemingly overwhelming data sets.

    1 year 3 weeks ago

  • Wise men say that you should never choose the easy path but, instead, live life fully. But when it comes to moving around the Unix file system, easy is good. And bash's builtin shopt command can make maneuvering even the most complicated file system paths easier.

    1 year 4 weeks ago

  • The history feature in Unix shells can save you a lot of time when typing long, fairly repetitious commands, but don't count on it to accurately represent history.

    1 year 5 weeks ago

  • If someone told you that, on average, an advanced attacker was on a system for 243 days before he was detected, would you fall off your seat? If so, then, fall off your seat.

    1 year 6 weeks ago

  • Knowing how and when to use the escape character can make your day, but commands get a little hairy when you first have to escape your escape.

    1 year 7 weeks ago

  • You can make your life a little easier and more productive by adding some Unix power to your Windows system.

    1 year 8 weeks ago

  • BSD -- the Berkeley Software Distribution flavor of Unix -- is alive and well and thriving on a remarkably secure system near you. And the second edition of Absolute OpenBSD (Michael W. Lucas, 2013, no starch press) is ready to teach you all about it.

    1 year 8 weeks ago

  • Whether you're setting up accounts for existing users on a new server or providing accounts for a crop of new staff members on your primary server, it's nice to be able to do the job quickly and accurately. The newusers command in Linux is designed to make this process as smooth as possible, but it may not do everything you expect -- especially if your data file is, uh, sloppy. Let's take a look at what it does and where it might fall short of expectations.

    1 year 9 weeks ago

  • Bash has quietly made scripting on Unix systems a lot easier with its own regular expressions. If you're still leaning on grep and sed commands to get your scripts to do what you need from them, maybe it's time to look into what bash can do on its own.

    1 year 11 weeks ago

  • Cron is not in charge; you are. All you need to do is tell it what you want done and when you want it done.

    1 year 12 weeks ago

  • Don't let an ISO 27001 audit ruin your week. Chin up and follow some simple rules to chase away the pain and the worry.

    1 year 13 weeks ago

  • A treasure trove of cheat sheets is yours for the clicking. Visit OverAPI.com for help with nearly any language or tool imaginable.

    1 year 14 weeks ago

  • A number of people have asked recently what it takes to be a Unix systems administrator, what “core competencies” are required, and what are the best and worst aspects of the job. Here are some answers that might work once we get beyond “it depends”.

    1 year 15 weeks ago

  • Are you someone who never met a Unix command you didn't like? OK, maybe not. But are there commands you just can't imagine living without? Let's look at some that have made a big difference on my busiest days and those that people I've worked with over the years have said are their most important essentials.

    1 year 16 weeks ago

  • While pipes are one of the things that make Unix such a powerful and versatile operating system, they don't always make sense. Many people still fall into the "useless use of a pipe" habit while still others use pipes in situations in which pipes simply don't function at all. Knowing when to pipe and when not to pipe remains a sign of Unix mastery. If you want to look Unix savvy, use pipes only when they provide a critical service and never when they're superfluous or downright wrong.

    1 year 17 weeks ago

  • Finding a computer infection that is, above all else, designed to remain hidden is not easy work, but neither is it impossible. With some good insights and tools, you might just get a leg up on how the multi-billion dollar spyware industry is attacking your systems.

    1 year 18 weeks ago

  • You could have a rootkit infection right now and be totally unaware. One of the key goals of a rootkit is, after all, to go undetected. If the rootkit is hiding files, processes, logins, etc., how would you know? If you can't see it, how would you remove it?

    1 year 19 weeks ago

Ask a Question
randomness