Getting started on the command line
As a SysAdmin, the Linux command line is typically my happy place. The command line interface, the CLI, is the closest I can get to the raw power of my computers. It gives me access to tools that make my work easy, fast, and even fun. I use the command line so much that I sometimes forget how much power I have to manage my computers.
I also forget that it took me a long time to really understand the terminology that applies to the various tools that I use to access that command line. This article is about those tools and the sometimes confusing terminology necessary to function on the CLI.
The Linux Philosophy for SysAdmins, Tenet 02 — Transforming Data Streams
Author's note: This article is excerpted in part from chapter 4 of my book, The Linux Philosophy for SysAdmins, with some changes. My article about...
Mastering the Linux cp Command: A Comprehensive Guide
When I began to use Linux over twenty-five years ago I was not as comfortable on the command line as I am now. I had...
How to use the basename command
The basename command is a GNU core utility for UNIX and UNIX-like systems, and is designed to remove the file suffix and leading directories from a filename. It’s a reasonable alternative to at least some uses of the cut command. You’re not likely to use it alone, but it’s an interesting tool to have available to you when constructing a complex command.
Everyday tech that runs on Linux
Linux runs almost everything, but many people are unaware of that. Some folks might be aware of Linux and might have heard it runs supercomputers....
The Linux Philosophy for SysAdmins, Tenet 01 — Data Streams, the universal interface
Everything in Linux revolves around streams of data – particularly text streams.
I recently Googled “data stream” and most of the top hits are concerned with processing huge amounts of streaming data in single entities such as streaming video and audio, or financial institutions processing streams consisting of huge numbers of individual transactions. This is not what we are talking about here although the concept is the same and a case could be made that current applications use the stream processing functions of Linux as the model for processing many types of data.
Linux: The Sustainable Choice for Computing and Environmental Responsibility
Sustainability is an increasingly important problem in computing. Reduce, reuse, and recycle is a famous motto for environmentally responsible consumption, but applying it to computer...
Complete Kickstart: How to Save Time Installing Linux
Author's note: This article first appeared in the June 2008 issue of Linux Magazine but is no longer maintained there. I republish it here with...
Windows security just got worse
Well, it didn't really get any worse, we just found another way in which it's already horrible. Like you, I woke up Friday morning to...
Signal: The Pinnacle of Secure Messaging
In a time of increasing digital privacy threats, Signal has emerged as a hope for those seeking secure and private communication. It has garnered praise...
Visual brand and identity
A user interface has a visual identity. See how simple shapes can represent several common interfaces.
How to do fast, repeatable Linux installations #3 — Ansible
In previous articles about my use of automation in performing post-install tasks for new Linux installations, Those approaches worked well for the times I used them, but as the requirements of my network and the hosts connected to it grew and became more complex, the capabilities of those tools couldn’t keep up.
I needed a new method for doing post-install tasks. I also needed new ways to perform other tasks, too. I started working with Ansible to first familiarize myself with it and then to perform more complex tasks such as Fedora updates and my post-install tasks.
How to create and use Public/Private/KeyPairs with SSH
SSH is an important mechanism for secure connections between Linux hosts. SSH is a software-based virtual private network (VPN) tool that can create a secure connection whenever needed. It can be used to securely login to any remote host so long as you have proper credentials, and it can be used to enhance tools such as tar and other backup programs like rsync so that remote hosts can be easily backed up to a local system. The scp (secure copy) program uses the SSH encrypted tunnel to copy files between a local host and a remote one.
Why I Use Linux
I use Linux for many reasons. These best reasons may help you understand why..
Automate Raspberry Pi tasks with crontab
If you need to do a task on a regular schedule, explore how you can use crontab to do the repetitive work for you.
Am I a SysAdmin?
Wikipedia defines a system administrator as “a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multiuser computers, such as servers.” In my experience, this can include computer and network hardware, software, racks and enclosures, computer rooms or space, and much more.