Books have been written on the subject of awk and sed. Here’s a small sample of commands I put together over the years that are useful for everyday system administration tasks. Most of these tasks …
Read the full story »
When you get a filesystem space alert (and they tend to arrive at 3:37 on Saturday morning), deleting various supersized log files is one option I already covered in adequate detail. That is if you get so lucky as to find such a file to delete…
Automatic Web page screenshots are commonly used for various monitoring tasks, such as detecting copyright infringement, website defacement, and other legal and security matters. Automatic screenshotting can also be a useful tool for researchers, developers, and journalists. There are free and open-source tools out there that can help you automate the task of creating Web page screenshots.
In his new book “The Future of Work: Robotics, AI, and Automation”1, Darrell West of the Brookings Institution makes some very extravagant predictions. Here’s a short but entirely sufficient summary from the book’s presentation by …
The installation and configuration process for AWS CLI is fairly simple. The package itself is installed with pip (yum -y install python-pip):
I rarely use GUIs, but when I do, it’s from CLI and every time I run into the annoying MIT-MAGIC-COOKIE-1 data did not match error. It’s easy to fix, but it happens to me so …
There are several tools you can use to verify access to a remote network port: nc, tcping, telnet. Unfortunately, nc from the netcat package has been replaced by the one from nmap, which lacks the -z option, making …
This simplest of problems just never fails to find a new victim. For whatever reason you want to delete all hidden files in the current directory and subfolders. Without much thinking you just type rm …
Just a quick command to double the size of the /tmp filesystem that uses tmpfs. This is for those situations when you can’t be bothered to think.
CollabNet VersionOne has released it’s 12th annual “State of Agile” report. The survey involved more than 1,400 software professionals in various roles and industries over the fourth quarter of 2017.
Only 12% responded that their organizations …
The ddgr python script is a command line interface for Duck Duck Go – a privacy-oriented search engine that, unlike Google, will not give away your data to the likes of Cambridge Analytica. In the …
The other day I ran into the “Flexible Import/Export” article by Bruce Byfield in the March 2018 issue of Linux Pro Magazine and thought it could use some more detail. So here’s some more detail.
The Linux Foundation just gave birth to seven supposedly interesting tips on how to prepare for a Linux SysAdmin job interview. Unfortunately, the research behind all this probably excellent advice was based on interviewing hiring …
Unix shell scripting language is run by the command-line interpreter and, as such, can be read and understood by anyone with sufficient access and experience. Sometimes this is not a good thing. Sometimes you want …
To make this long (and embarrassing) story short: a friend’s kid had a homework assignment in geometry to calculate the surface area of a conjoined cone, a cylinder, and a hemisphere.
After downloading a Raspbian image and writing it to an SD card, you get the following error when trying to boot the Pi: “Could not expand filesystem, please try raspi-config or rc_gui. Boot and root …
Automatic Web page screenshots are commonly used for various monitoring tasks, such as detecting copyright infringement, website defacement, and other legal and security matters. Automatic screenshotting can also be a useful tool for researchers, developers, …
This is a description of an uncomplicated setup for an encrypted volume and portable applications for a Windows laptop consisting of a USB3 storage device, VeraCrypt OSS OTFE, a hardware password wallet, and portableapps.com software.
When the SSL Digital Certificate is intercepted and replaced by a device between your browser and the Web site, we call it certificate injection. This method is more commonly used not by hackers, but by …
Just a list of commands to quickly configure tmux with some of the best (i.e. my favorite) plugins and options. Feel free to disagree – you may be right – but I don’t think so.
Every time a filesystem is running out of space and I need to find something to delete, I end up googling the syntax for the find command to make sure it stays off NFS and …
Just some notes for setting up SSL with your self-hosted WordPress hosting installation. Just got around to doing this the other day. Yeah, I know, about time…
Let’s say you want to see who was logged in on the server during last weekend. This includes users who, say, logged in on Thursday and haven’t logged out until Saturday afternoon.
Latest Comments