Books have been written on the subject of awk and sed. Here’s a small sample of commands I put together over the years that are useful for everyday system administration tasks. Most of these tasks …
Read the full story »
When you look at the CPU activity of your computer, one of the parameters is the iowait. This value shows how much time your CPU wastes while it is waiting for I/O operations for complete. …
Xbox 360 uses UPnP protocol to stream multimedia files from computers on your home network. Normally, you would have a Windows PC running WMP and sharing files. But what if you have a Linux box …
Content management systems are sprouting up like mushrooms after a warm April rain. If your job is to find the perfect CMS for your needs, you can spend weeks analyzing and comparing features of various …
When performing a new Unix OS installation you are usually presented with a choice of accepting the default partitioning layout or going into advanced settings and defining your own partitions. The default layout will normally …
Google offers a remarkable set of powerful features. Unfortunately, most people are not aware of these possibilities. They use only the most basic functionality offered by Google and then waste their time on weeding out …
Converting sets of images into multi-page PDF files makes it easier to organize and share them. All you need for the conversion is the free that will run on your Windows, Linux, MacOS and many other operating systems. If you are running a recent version of Linux, chances are that ImageMagick is already installed on your computer (just type “which convert” to check).
As more Web surfers get high-speed access, Web designers are tempted to go overboard with multimedia sites that waste your time and distract you from the content. This little collection of Web designs is proof …
This is a rather peculiar little script with a purpose that may not be immediately apparent. The script will look for files in the specified folder; it will then pick one at random from the …
Never ever upgrade WordPress to the latest version as soon as it comes out, unless you want to be the guinea pig dealing with the new bugs and incompatible plugins. Even if the new version …
Below are some basic steps to secure a wireless access point (WAP). The screenshots are for Linksys WAP54G v. 3.04, however, the same steps will apply to wireless access points from other manufacturers. Understand this: …
Apparently there are folks out there who are still interested in running their own Web server from home. More than that – they want to have multiple domains. Guys, Web hosting these days is so …
You have information on your computer that you don’t want others to see. Sometimes you want to share information with someone, but you don’t want anyone to know that you are the one sharing it. Let’s say that you came across some information suggesting that your employer may be breaking law. You want to make this information public, but you can’t do it openly becausloe you will be fired. Another example: you are at work and you need to send a personal, confidential email…
Scali Manage – the bloated and unpredictable HPC cluster management tool – has recently been acquired by Platform Computing Corp. It is to be integrated into Platform LSF and Platform OCS products. I can’t say …
Some users and application developers believe that any free disk space on the server belongs to them. Suddenly you get an email alert saying that a server “xyz” ran out of disk space in /home. …
Let’s say you moved your server to a new network and now it has a different IP address. You know your users have a habit of hard-coding the server’s IP into their scripts. So you …
How do you protect your computer from viruses? Most computer users just buy antivirus software, install it, and reboot their PC – done. If only it was that easy. Over the past several years percentage of home and business computers infected with viruses has been steadily growing. Most PCs are sold these days with preinstalled antivirus software. And yet, the number of infected computers keeps on growing…
Normally I don’t concern myself with Windows- related matters. However, the infamous Bagle rootkit and its numerous variations deserve some attention even from Unix sysadmins. Bagle annoyed me and my customers long enough. Essentially, Bagle …
You business depends on your computers. Your employees need their databases, emails, files and applications to do their jobs. Imagine that you come to work on Monday and your database server is gone. How? It doesn’t matter. Let’s say it was transported out of your datacenter by the Romulans. Or, perhaps, the sprinkler system malfunctioned, flooded your datacenter and reduces your database server to a steaming, shorted out pile of junk.
Many WordPress theme designers choose to cut some corners with their creations. One of the more important things they skip over is print.css – the stylesheet that controls your blog’s appearance when you print it. …
Recently I ran into a small problem. A customer of mine was moving her site to a new hosting provider. Her old provider was Windows-based and her new provider was Linux-based. The old provider did …
Research shows that majority of everyday computer problems are caused by poor network configuration. That small white Ethernet cable plugged into the back of your PC is where most of your computer-related headaches are coming …
This is a quick-and-dirty guide to recovering VxVM volumes and filesystems on a Solaris server. These instructions are not intended to be an in-depth troubleshooting guide for the Veritas Volume Manager. This is just something …
Latest Comments