Featured »

March 2, 2022 – 2:00 pm

Books have been written on the subject of awk and sed. Here’s a small sample of commands I put together over the years that are useful for everyday system administration tasks. Most of these tasks …

Read the full story »
Networking

Unix and Linux network configuration. Multiple network interfaces. Bridged NICs. High-availability network configurations.

Applications

Reviews of latest Unix and Linux software. Helpful tips for application support admins. Automating application support.

Data

Disk partitioning, filesystems, directories, and files. Volume management, logical volumes, HA filesystems. Backups and disaster recovery.

Monitoring

Distributed server monitoring. Server performance and capacity planning. Monitoring applications, network status and user activity.

Commands & Shells

Cool Unix shell commands and options. Command-line tools and application. Things every Unix sysadmin needs to know.

Linux and High I/O Wait

December 21, 2008 – 12:07 am
network_cable_01

When you look at the CPU activity of your computer, one of the parameters is the iowait. This value shows how much time your CPU wastes while it is waiting for I/O operations for complete. …

Sharing Videos from Linux to Xbox 360

December 19, 2008 – 8:49 pm
old film projector with dramatic lighting

Xbox 360 uses UPnP protocol to stream multimedia files from computers on your home network. Normally, you would have a Windows PC running WMP and sharing files. But what if you have a Linux box …

What’s the Best CMS

July 29, 2008 – 2:57 pm

Content management systems are sprouting up like mushrooms after a warm April rain. If your job is to find the perfect CMS for your needs, you can spend weeks analyzing and comparing features of various …

Partitioning System Disk

July 24, 2008 – 8:25 pm
hard_disk_drive_hdd_0005

When performing a new Unix OS installation you are usually presented with a choice of accepting the default partitioning layout or going into advanced settings and defining your own partitions. The default layout will normally …

Google Tips and Tricks

July 22, 2008 – 11:15 am
computer_security_it_privacy_0003

Google offers a remarkable set of powerful features. Unfortunately, most people are not aware of these possibilities. They use only the most basic functionality offered by Google and then waste their time on weeding out …

Convert Images to PDF

July 18, 2008 – 12:26 am
Visualization

Converting sets of images into multi-page PDF files makes it easier to organize and share them. All you need for the conversion is the free that will run on your Windows, Linux, MacOS and many other operating systems. If you are running a recent version of Linux, chances are that ImageMagick is already installed on your computer (just type “which convert” to check).

Best of Web Design

June 24, 2008 – 2:41 pm

As more Web surfers get high-speed access, Web designers are tempted to go overboard with multimedia sites that waste your time and distract you from the content. This little collection of Web designs is proof …

Random Filename Chooser

June 17, 2008 – 9:02 pm
lock code

This is a rather peculiar little script with a purpose that may not be immediately apparent. The script will look for files in the specified folder; it will then pick one at random from the …

WordPress Quick Upgrade for Linux

June 13, 2008 – 6:22 pm
wordpress_0003

Never ever upgrade WordPress to the latest version as soon as it comes out, unless you want to be the guinea pig dealing with the new bugs and incompatible plugins. Even if the new version …

Linksys WAP54G Secure Configuration

June 11, 2008 – 1:09 pm
wireless access point ap

Below are some basic steps to secure a wireless access point (WAP). The screenshots are for Linksys WAP54G v. 3.04, however, the same steps will apply to wireless access points from other manufacturers. Understand this: …

Apache and Multiple Domains – from Home

June 10, 2008 – 5:15 pm
apache

Apparently there are folks out there who are still interested in running their own Web server from home. More than that – they want to have multiple domains. Guys, Web hosting these days is so …

Data Security and Online Privacy

June 9, 2008 – 4:57 pm
computer_security_0005

You have information on your computer that you don’t want others to see. Sometimes you want to share information with someone, but you don’t want anyone to know that you are the one sharing it. Let’s say that you came across some information suggesting that your employer may be breaking law. You want to make this information public, but you can’t do it openly becausloe you will be fired. Another example: you are at work and you need to send a personal, confidential email…

Scali Manage (Platform Manager) CLI Guide

June 5, 2008 – 10:24 pm
trash

Scali Manage – the bloated and unpredictable HPC cluster management tool – has recently been acquired by Platform Computing Corp. It is to be integrated into Platform LSF and Platform OCS products. I can’t say …

Dealing With Disk Hogs

June 1, 2008 – 5:49 pm
hard_disk_drive_hdd_0005

Some users and application developers believe that any free disk space on the server belongs to them. Suddenly you get an email alert saying that a server “xyz” ran out of disk space in /home. …

Useful SysAdmin Scripts: Search-and-Replace

June 1, 2008 – 3:03 pm
binoculars watch security rifle gun

Let’s say you moved your server to a new network and now it has a different IP address. You know your users have a habit of hard-coding the server’s IP into their scripts. So you …

Effective Virus Protection

May 28, 2008 – 5:13 pm
Computer Password Security

How do you protect your computer from viruses? Most computer users just buy antivirus software, install it, and reboot their PC – done. If only it was that easy. Over the past several years percentage of home and business computers infected with viruses has been steadily growing. Most PCs are sold these days with preinstalled antivirus software. And yet, the number of infected computers keeps on growing…

Tips on dealing with the Bagle rootkit

May 26, 2008 – 5:51 pm
Computer Password Security

Normally I don’t concern myself with Windows- related matters. However, the infamous Bagle rootkit and its numerous variations deserve some attention even from Unix sysadmins. Bagle annoyed me and my customers long enough. Essentially, Bagle …

Disaster Recovery Management

May 25, 2008 – 6:49 pm

You business depends on your computers. Your employees need their databases, emails, files and applications to do their jobs. Imagine that you come to work on Monday and your database server is gone. How? It doesn’t matter. Let’s say it was transported out of your datacenter by the Romulans. Or, perhaps, the sprinkler system malfunctioned, flooded your datacenter and reduces your database server to a steaming, shorted out pile of junk.

Creating print.css for WordPress

May 24, 2008 – 6:35 pm
wordpress

Many WordPress theme designers choose to cut some corners with their creations. One of the more important things they skip over is print.css – the stylesheet that controls your blog’s appearance when you print it. …

Migrating email between hosted providers

May 23, 2008 – 9:38 pm
Postfix_logo

Recently I ran into a small problem. A customer of mine was moving her site to a new hosting provider. Her old provider was Windows-based and her new provider was Linux-based. The old provider did …

Home Network Configuration Basics

May 20, 2008 – 11:59 pm
ethernet cables

Research shows that majority of everyday computer problems are caused by poor network configuration. That small white Ethernet cable plugged into the back of your PC is where most of your computer-related headaches are coming …

VxVM Recovery Cheatsheet for Solaris

May 15, 2008 – 6:22 pm
sun_solaris_0002

This is a quick-and-dirty guide to recovering VxVM volumes and filesystems on a Solaris server. These instructions are not intended to be an in-depth troubleshooting guide for the Veritas Volume Manager. This is just something …