Whenever a server is accessible via the Internet, it's a safe bet that hackers will be trying to access it. Just look at the SSH logs for any server you use, and you'll surely find lots of "...
SSH is a Swiss Army knife and Hogwart's magic wand all rolled into one simple command-line tool. As often as we use it, we sometimes forget that even our encrypted friend can be secured more than it...
Most of us longtime system administrators get a little nervous when people start talking about DevOps. It's an IT topic surrounded by a lot of mystery and confusion, much like the term "Cloud...

Dr Hjkl on the Command Line

The first time I used vi was in a college programming course. It was the default editor on the computer lab's UNIX systems we used to compile our assignments. I remember when our professor first introduced vi and explained that you used the hjkl keys to move your cursor around instead of the arrow keys. more>>

Initializing and Managing Services in Linux: Past, Present and Future

One of the most crucial pieces of any UNIX-like operating system is the init dæmon process. In Linux, this process is started by the kernel, and it's the first userspace process to spawn and the last one to die during shutdown. more>>

Raspberry Pi competitor

Goodbye, Pi. Hello, C.H.I.P.

A new mini-computer is on the way, and it looks like it may be the Raspberry Pi killer we've all been waiting for (sorry Pi). C.H.I.P. is its name, and it looks set to wipe the floor with its established competitor on several counts:

1. It's completely open source. I don't just mean the software, either. more>>

Using Hiera with Puppet

With Hiera, you can externalize your systems' configuration data and easily understand how those values are assigned to your servers. With that data separated from your Puppet code, you then can encrypt sensitive values, such as passwords and keys. more>>

Urgent Kernel Patch for Ubuntu

Linux is engineered with security in mind. In fact, the most fundamental security mechanisms are built right in to the kernel itself, which makes it extremely hard for malicious code to bypass. more>>

Gartner Dubs DivvyCloud Cool Cloud Management Vendor

DivvyCloud, a fast growing McLean, VA cloud management technology company, has been included in “2015 Cool Vendors” for Cloud Management by Gartner. The report finds “next-generation cloud management architectures are becoming easier to use and implement. more>>

Apache Web Servers and SSL Encryption

Apache Web Servers and SSL Encryption

Congratulations! You’ve decided to set up a Web site. The site might be for your personal use, for sharing family pictures, for a blog, for an SaaS application, or any number of other possibilities. In all of those cases, people will access your site using the Hypertext Transfer Protocol (HTTP). more>>

Infinite BusyBox with systemd

Lightweight virtual containers with PID 1.

In this article, I demonstrate a method to build one Linux system within another using the latest utilities within the systemd suite of management tools. The guest OS container design focuses upon BusyBox and Dropbear for the userspace system utilities, but I also work through methods for running more general application software so the containers are actually useful. more>>

Android Candy: Every Hero Needs a Sidekick

I've touted the awesomeness of Calibre in the past. And although the Web-based calibre2opds still is an awesome way to access your eBook library, using a native Android app is even smoother. more>>

Ubuntu Snappy Core for Cloud

A More Stable Future for Ubuntu

Canonical has announced plans to switch all versions of Ubuntu to its new Snappy package manager. The new tool offers the promise of greater stability and security for the system and applications. more>>

It's Easier to Ask Forgiveness...

...than to understand Linux permissions! Honestly though, that's not really true. Linux permissions are simple and elegant, and once you understand them, they're easy to work with. Octal notation gets a little funky, but even that makes sense once you understand why it exists.

Users and Groups: more>>

diff -u: What's New in Kernel Development

One ongoing question kernel developers face is the best way to delete data so no one else can recover it. Typically there are simple tools to undelete files that are deleted accidentally, although some filesystems make this easier than others. more>>

Chrome-Colored Parakeets

I personally like Google's Chrome interface. It's simple, fast, elegant and did I mention fast? Unfortunately, I don't like how locked down the Chrome OS is on a Chromebook, nor do I like its total dependence on Google. I also don't like the lack of ability to install Chrome easily on generic hardware. Thankfully, Budgie is here to help. more>>

Mumblehard--Let's End Its Five-Year Reign

Linux has a well deserved reputation as being one of the most secure platforms for individuals and businesses. This is largely due to the way security is integrated into the system, but there is a great risk in being too complacent. Recent events serve to remind us that there is no such thing as an uncrackable system. more>>

An Easy Way to Pay for Journalism, Music and Everything Else We Like

Some of us work for money. Some of us work for love. Some of us work for both, or just because we feel compelled or obliged. more>>

Syndicate content
Geek Guide
The DevOps Toolbox

Tools and Technologies for Scale and Reliability
by Linux Journal Editor Bill Childers

Get your free copy today

Sponsored by IBM

Webcast
8 Signs You're Beyond Cron

Scheduling Crontabs With an Enterprise Scheduler
On Demand
Moderated by Linux Journal Contributor Mike Diehl

Sign up and watch now

Sponsored by Skybot