How to be a more productive Linux system administrator
Came across a nice little article at IBM developerworks today. Learned a new command and got reminded of a few things. It was worth my time reading it. Here’s a quote of the summary of the article…...
View ArticlePublic key authentication with SSH. Both with and without a password.
This article will run through quick and easy examples for setting up public key authentication with SSH. I will include one example that requires a password and one that does not. Typically used for...
View ArticleUseful GNU/Linux search commands
These will work on any GNU/Linux system. Find the email address someone@example.com within the path /etc recursively grep -H -r "someone@example.com" /etc -H, –with-filename Print the file name for...
View ArticleConfiguring Windows 7 support for UTC BIOS time
Windows 7 does not natively support UTC time. Which makes it a problem if you’re also running either Linux or OSX on the same machine. Either way having your BIOS keep time using UTC is the proper way....
View ArticleLinux ACL
An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object. ACL allows you to grant or deny permissions for any user or group on a filesystem...
View ArticleHow to configure network bonding (LACP) on Debian Wheezy
This process essentially consist of two steps. I will be detailing steps relevant for the Linux host. Configuring the switch for LACP bonding. Configuring the Linux host for LACP bonding. Prerequisites...
View ArticleHow to identify ECC memory modules
This is a short article describing how you proceed to identify whether or not you have ECC memory modules in your Linux workstation or server. Also as a side note, the importance of ECC memory is...
View Article
More Pages to Explore .....