How to remove file metadata on Linux
http://xmodulo.com/2014/08/remove-file-metadata-linux.htmlA typical data file often has associated "metadata" which is descriptive information about the file, represented in the form of a set of...
View ArticleCheck Hard drive for bad sectors or bad blocks in linux
http://www.linuxtechi.com/check-hard-drive-for-bad-sector-linuxbadblocks is the command or utility in linux like operating system which can scan or test our hard disk and external drive for bad...
View ArticleHow to manage a WiFi connection from the command line
http://xmodulo.com/2014/08/manage-wifi-connection-command-line.htmlWhenever you install a new Linux distribution on a computer, it is in general recommended that you connect to the internet via a wired...
View Articleumask - find default permissions in linux
http://www.nextstep4it.com/magazines/nseditions/2014/June14_Edition/linux1.phpYou may be wondering about where these file permissions come from. The answer is umask. The umask command sets the default...
View ArticleWhat are useful CLI tools for Linux system admins
http://xmodulo.com/2014/08/useful-cli-tools-linux-system-admins.htmlSystem administrators (sysadmins) are responsible for day-to-day operations of production systems and services. One of the critical...
View ArticleHow to Encrypt Email in Linux
http://www.linux.com/learn/tutorials/784165-how-to-encrypt-email-in-linuxKgpg provides a nice GUI for creating and managing your encryption keys.If you've been thinking of encrypting your email, it is...
View ArticleTop 4 Linux download managers
http://www.linuxuser.co.uk/reviews/top-4-linux-download-managersImprove and better manage your web downloads for mirroring, mass grabs or just better control over your filesDownload managers seem to be...
View ArticlePostfix – Enable logging of email’s subject in maillog
http://www.linuxtechi.com/log-email-subject-maillogBy default postfix only capture ‘From’ and ‘To’ details in the log file (/var/log/maillog). There are some scenarios where we want that email’s...
View ArticleThe Complete Beginner's Guide to Linux
http://www.linux.com/learn/tutorials/784060-the-complete-beginners-guide-to-linuxFrom smartphones to cars, supercomputers and home appliances, the Linux operating system is everywhere.Linux. It’s been...
View ArticleMonitoring Android Traffic with Wireshark
http://www.linuxjournal.com/content/monitoring-android-traffic-wireshark The ubiquity and convenience of smartphones has been a real boon for getting information on the go. I love being able to jump on...
View ArticleOpenSSH: Going flexible with forced commands
http://binblog.info/2008/10/20/openssh-going-flexible-with-forced-commandsFiled under: Security, UNIX & Linux— Tags: command, openssh— martin @ 9:32 am As we all know, it is possible to use SSH not...
View ArticleUnix: Viewing your processes through the eyes of /proc
http://www.itworld.com/operating-systems/432024/unix-viewing-your-processes-through-eyes-procThe /proc file system brings the processes on your Unix systems into view in some very useful ways, but only...
View ArticleHow to configure Access Control Lists (ACLs) on Linux
http://xmodulo.com/2014/08/configure-access-control-lists-acls-linux.htmlWorking with permissions on Linux is rather a simple task. You can define permissions for users, groups or others. This works...
View ArticleLinux Tutorial: Install Ansible Configuration Management And IT Automation Tool
http://www.cyberciti.biz/python-tutorials/linux-tutorial-install-ansible-configuration-management-and-it-automation-toolToday I will be talking about ansible, a powerful configuration management...
View Article5 Awesome Open Source Cloning Software
http://www.cyberciti.biz/datacenter/5-awesome-open-source-cloning-softwareCloning is nothing but the copying of the contents of a server hard disk to a storage medium (another disk) or to an image...
View ArticleLinux: Hide Processes From Other Users
http://www.cyberciti.biz/faq/linux-hide-processes-from-other-usersI run a multi-user system. Most users access resources using ssh client. How can I stop leaking process information to all users on...
View ArticleHow to sniff HTTP traffic from the command line on Linux
http://xmodulo.com/2014/08/sniff-http-traffic-command-line-linux.htmlSuppose you want to sniff live HTTP web traffic (i.e., HTTP requests and responses) on the wire for some reason. For example, you...
View ArticleLinux Performance Tools at LinuxCon North America 2014
http://www.brendangregg.com/blog/2014-08-23/linux-perf-tools-linuxcon-na-2014.htmlThis week I spoke at LinuxCon North America 2014 in Chicago, which was also my first LinuxCon. I really enjoyed the...
View ArticlejBilling tutorial – an open source billing platform
http://www.linuxuser.co.uk/tutorials/jbilling-tutorial-an-open-source-billing-platform Discover jBilling and make managing invoices, payments and billing simple and stress-free Follow @LinuxUserMag A...
View ArticleSecurity Hardening with Ansible
http://www.linuxjournal.com/content/security-hardening-ansibleAnsible is an open-source automation tool developed and released by Michael DeHaan and others in 2012. DeHaan calls it a "general-purpose...
View Article