Linux Commands frequently used by Linux Sysadmins – Part 4
We are now up to part 4 of this five-part series entitled: Linux Commands frequently used by Linux Sysadmins. By the end of this series, we will cover at least 50 commands. Thus…
We are now up to part 4 of this five-part series entitled: Linux Commands frequently used by Linux Sysadmins. By the end of this series, we will cover at least 50 commands. Thus…
Last week and the week before, I published part 1 and part 2 of this five-part series entitled: Linux Commands frequently used by Linux Sysadmins. Those two articles took us a bit deeper into what…
Last week, I published part 1 of this five-part series entitled: Linux Commands frequently used by Linux Sysadmins. That first article scratched the surface of what, I believe, are 50 to 100 commands used often…
What are some Linux commands used by Sysadmins and power users daily? In this article, I’ve listed 10 such commands frequently used. Suggestions and feedback are welcome. Also, see Part 2, Part 3, Part…
In my last tutorial I showed you how to remove paginated page URLs in WordPress. In that guide I shared code to 301 redirect paginated URLs that aren’t needed. However, in some cases…
As a Linux user or administrator, you are probably familiar with the most popular Linux distribution: Ubuntu. However, have you considered trying out independent Linux distros? In this article, I will explain why…
Observability is a critical aspect of modern software development, providing teams with the ability to monitor and understand the performance of their applications and infrastructure. Recently, several companies have emerged as leaders in…
Creating, modifying, and deleting files are everyday tasks performed in any operating system, even more so by Sysadmins, Developers, and Programmers. For the most part, these tasks are fast enough when managing a…
Linux server security is of critical importance to sysadmins. One central part of keeping Linux servers secure is by installing security updates promptly. Too often, there are compromised servers on the internet due…
MongoDB is an open-source NoSQL database management system that stores data in JSON-like documents. It’s designed to handle large volumes of data with a document-oriented architecture and can operate without a predefined schema,…
Some time ago, I received an email from a client experiencing slow performance issues with a LEMP (Linux, Nginx, MySQL, and PHP web server). During a full audit, I found that the server’s…
Upgrading from CentOS 7 to AlmaLinux 8 is a significant step towards ensuring that your systems remain secure, supported, and up-to-date with the latest features and security patches. AlmaLinux 8, as a community-driven…
To build experience with Linux commands, there are a few things you can do. First, try to use the command line interface as much as possible. This will give you practice with the…
The official alternative to CentOS 8 is CentOS Stream. Read: Converting from CentOS Linux to CentOS Stream. According to Chris Wright, Red Hat’s CTO, the CentOS Stream project provides “a rolling preview of…
atop -m Additional examples of using the ‘atop’ command for Linux server performance analysis: atop -c atop is an ASCII full-screen performance monitor that can log and report the activity of all server…
htop uses a cursor-controlled interface for sending signals to processes. One example where this is helpful is: you don’t have to type in PIDs; select one or more processes using your mouse cursor…
For added security, you can also use additional tools or services, such as ModSecurity and Sucuri. Or, instead of CSF + LFD, you can use APF + BFD. There’s also bitninja.io, Imunify360 and others….
My Home lab – a work in progress (everything pictured is listed below) As of today, I’ve almost completed the setup of my new Home lab, and it’s now fully functional. I’m pleased…