In this article, you’ll find recent commentary from executives and decision-makers of industry-leading observability providers on two key questions regarding the evolution of observability. Published: May 17th, 2021 | Updated: Aug 1st, 2024. The observability cloud continues to expand and evolve rapidly. Over the past year, millions of workers left their offices to work from […]
mv command in Linux, with examples
This mv command guide is a follow-up of my previous 90 Linux Commands frequently used by Linux Sysadmins article. Every week, or as time allows, I will publish articles on around 90 commands geared toward Linux sysadmins and Linux power users. Let’s continue this series with the mv command. In the world of Linux, the mv command is […]
Linux: ncdu and mc to manage large directories
Creating, modifying, and deleting files are everyday tasks performed in any operating system, even more so by Sysadmins, Developers, and Programmers. For the most part, these tasks are fast enough when managing a handful of files. However, on Linux and especially with servers, you may, at some time, have to manage millions or even billions […]
Using the find command in Linux with examples
This find command guide is a follow-up of my previous 90 Linux Commands frequently used by Linux Sysadmins article. Every week, or as time allows, I will publish articles on the ~ 90 commands geared toward Linux sysadmins and Linux power users. Let’s continue this series with the find command. The find command is part of findutils which […]
grep command in Linux w/ examples
This grep command guide is a follow-up of my previous 90 Linux Commands frequently used by Linux Sysadmins article. Every week, or as time allows, I will publish articles on around 90 commands geared toward Linux sysadmins and Linux power users. Let’s continue this series with the grep command. Grep (global regular expression printer) searches through a file for a […]
How to Secure Your Linux Server from Emerging Cyber Attacks
In today’s world, cybersecurity has become a crucial factor in safeguarding online assets against emerging cyber threats. This is especially true for Linux servers, which are often targeted by cybercriminals due to their popularity and widespread use. In this blog post, we will cover seven essential tips for securing your Linux server against cyberattacks. These […]
How to Enable Unattended Upgrades on Ubuntu/Debian
Linux server security is of critical importance to sysadmins. One central part of keeping Linux servers secure is by installing security updates promptly. Too often, there are compromised servers on the internet due to pending security updates waiting for a manual update. On both Ubuntu and Debian, the unattended-upgrades package can be configured to perform […]
Enable Automatic Updates – Fedora/Red Hat + Bonus Tip
Linux server security is crucial to Linux server administration. Part of keeping Linux servers secure is installing security updates shortly after they become available. Too often, compromised servers are a result of pending security updates awaiting manual installation. In general, for critical servers where you cannot afford unplanned downtime should be very careful with automatic updates. While there are […]
Best Linux distro and Desktop Environment Combinations
Are you searching for the best Linux distro (distribution) and DE (Desktop Environment) combination? What better way to increase your familiarity with Linux servers than running Linux on your laptop or workstation? As mentioned previously, there’s the best Linux Distro for me and the best Linux Distro for you. What you choose today will often change […]
Ransomware: Implementing a “No Concessions” Ransomware Policy
Ransomware has emerged as a particularly relentless and disruptive force against organizations worldwide. The debate over whether to adopt a “no concessions” policy—refusing to pay ransoms to cybercriminals—mirrors long-standing discussions in counter-terrorism and hostage situations. This article aims to explore the various facets of this debate, considering ethical, legal, and strategic dimensions, and evaluating the […]