Tagged articles
5000 articles
Page 19 of 50
Open Source Linux
Open Source Linux
May 9, 2024 · Fundamentals

How NFS and RPC Enable Seamless File Sharing in Linux Environments

This article explains the fundamentals of Network File System (NFS), its reliance on RPC for communication, the step‑by‑step workflow of NFS operations, configuration details in /etc/exports, common troubleshooting cases, and practical command‑line examples for Linux administrators.

LinuxNFSRPC
0 likes · 10 min read
How NFS and RPC Enable Seamless File Sharing in Linux Environments
Efficient Ops
Efficient Ops
May 8, 2024 · Information Security

How to Detect and Recover from Linux Server Intrusions: 11 Essential Checks

This guide walks Linux operations engineers through eleven practical checks—including log inspection, user file verification, login event analysis, network traffic monitoring, and file recovery via lsof—to identify and remediate compromised machines effectively.

LinuxSysadminintrusion detection
0 likes · 7 min read
How to Detect and Recover from Linux Server Intrusions: 11 Essential Checks
MaGe Linux Operations
MaGe Linux Operations
May 6, 2024 · Operations

Mastering CentOS 7 Network Configuration: ifconfig, ifup, ifdown & More

This guide explains how to use ifconfig to view and modify network interfaces, manage them with ifup/ifdown, and configure CentOS 7 networking through key files such as /etc/sysconfig/network-scripts, plus essential supplementary ip commands and troubleshooting tips for virtual machine MAC address issues.

CentOSLinuxifconfig
0 likes · 10 min read
Mastering CentOS 7 Network Configuration: ifconfig, ifup, ifdown & More
Liangxu Linux
Liangxu Linux
May 6, 2024 · Operations

Master Fast Log Error Detection with Tail, Grep, and Sed Commands

This guide shows how to quickly locate errors in massive log files using Linux commands such as tail, head, grep, and sed, offering multiple techniques—including line‑number extraction, time‑range queries, match counting, colored highlights, and pagination—to streamline debugging and log analysis.

Command LineGrepLinux
0 likes · 12 min read
Master Fast Log Error Detection with Tail, Grep, and Sed Commands
Liangxu Linux
Liangxu Linux
May 6, 2024 · Information Security

Master Secure Remote Access: A Complete Linux SSH Configuration Guide

This step‑by‑step guide explains how to install, configure, and harden SSH on Linux, covering service setup, key generation, client configuration, file transfer, tunneling, ProxyJump, login banners, password‑less authentication, time/IP restrictions, fail2ban monitoring, multi‑factor authentication, ssh‑agent usage, and regular maintenance.

Fail2banLinuxRemote access
0 likes · 9 min read
Master Secure Remote Access: A Complete Linux SSH Configuration Guide
MaGe Linux Operations
MaGe Linux Operations
May 5, 2024 · Fundamentals

Mastering Linux Filesystem Hierarchy: A Complete Guide to FHS Directories

This article explains the Linux Filesystem Hierarchy Standard (FHS), detailing the purpose and typical contents of each top‑level directory such as /, /usr, /var, and their subdirectories, while clarifying concepts like static vs. variable, shareable vs. unshareable, and absolute versus relative paths.

Directory StructureFHSFilesystem
0 likes · 19 min read
Mastering Linux Filesystem Hierarchy: A Complete Guide to FHS Directories
Liangxu Linux
Liangxu Linux
May 5, 2024 · Information Security

Master Linux Firewall: Step‑by‑Step firewalld, iptables & fail2ban Guide

This article provides a comprehensive, hands‑on tutorial for securing Linux systems by configuring firewalld with firewall‑cmd, managing iptables rules, enabling port forwarding, setting up fail2ban, and applying advanced techniques such as SELinux, TCP wrappers, and connection‑tracking to harden the firewall.

LinuxSysadminfirewall
0 likes · 9 min read
Master Linux Firewall: Step‑by‑Step firewalld, iptables & fail2ban Guide
21CTO
21CTO
May 4, 2024 · Operations

10 Essential Linux Commands for Network Troubleshooting (Examples & Usage)

This guide introduces ten fundamental Linux commands—ping, traceroute, netstat, ifconfig/ip, tcpdump, nslookup/dig, iptables/firewalld, ss, arp, and mtr—explaining their purpose, installation steps, and practical examples to help administrators diagnose and resolve network issues efficiently.

LinuxSysadminnetwork troubleshooting
0 likes · 16 min read
10 Essential Linux Commands for Network Troubleshooting (Examples & Usage)
Liangxu Linux
Liangxu Linux
May 4, 2024 · Operations

Master Linux I/O Monitoring: iostat, iotop, and lsof Explained

This guide introduces three essential Linux I/O commands—iostat for disk activity statistics, iotop for real‑time I/O usage per process, and lsof for listing open files—detailing installation, output interpretation, key parameters, and practical usage examples.

I/O MonitoringLinuxSystem Administration
0 likes · 10 min read
Master Linux I/O Monitoring: iostat, iotop, and lsof Explained
DevOps Operations Practice
DevOps Operations Practice
May 3, 2024 · Information Security

Top Antivirus Solutions for Linux Systems

This article reviews several leading cross‑platform antivirus products—Avast, ESET NOD32, F‑PROT, ClamAV, Comodo, and Sophos—highlighting their features, Linux compatibility, and considerations for securing servers while noting that proper security practices may reduce the need for constant antivirus deployment.

AntivirusInformation SecurityLinux
0 likes · 5 min read
Top Antivirus Solutions for Linux Systems
MaGe Linux Operations
MaGe Linux Operations
May 3, 2024 · Fundamentals

Understanding User vs Kernel Space and Modern I/O Models in Linux

This article explains the separation of user and kernel space, compares blocking, non‑blocking, multiplexed, signal‑driven, and asynchronous I/O models, and details the select, poll, and epoll mechanisms used to efficiently handle multiple file descriptors in Linux.

I/O MultiplexingKernel SpaceLinux
0 likes · 12 min read
Understanding User vs Kernel Space and Modern I/O Models in Linux
Liangxu Linux
Liangxu Linux
May 3, 2024 · Operations

Essential Linux Command Cheatsheet: Find, Unzip, Sed, Disk Monitoring & More

A practical guide that compiles dozens of essential Linux shell commands—from locating and moving .tar files, batch unzipping, powerful sed edits, directory checks, disk‑space alerts, to Nginx log analysis and firewall rules—complete with clear examples and explanations for system administrators.

LinuxScriptingautomation
0 likes · 8 min read
Essential Linux Command Cheatsheet: Find, Unzip, Sed, Disk Monitoring & More
DevOps Operations Practice
DevOps Operations Practice
May 2, 2024 · Operations

Quick Deployment of a Zabbix Monitoring Platform Using Docker

This article explains how to set up a Zabbix monitoring system by installing Docker, pulling necessary images, creating storage volumes, and running containers for MySQL, Zabbix server, Java gateway, web interface, and agents, providing a fast, container‑based deployment solution.

Container DeploymentLinuxMonitoring
0 likes · 8 min read
Quick Deployment of a Zabbix Monitoring Platform Using Docker
Liangxu Linux
Liangxu Linux
May 2, 2024 · Operations

Essential Linux Monitoring Tools and How to Use Them

This guide introduces essential Linux monitoring commands such as top, htop, vmstat, iostat, sar, netstat, iftop, tcpdump, and Glances, explains their usage with example code, and shows how to analyze logs and create custom scripts for comprehensive system performance tracking.

LinuxPerformancesystem-monitoring
0 likes · 7 min read
Essential Linux Monitoring Tools and How to Use Them
Liangxu Linux
Liangxu Linux
May 1, 2024 · Operations

Master Linux Package Managers: apt, yum, dnf, pacman, zypper

This guide explains how to use the major Linux package managers—apt, yum, dnf, pacman, and zypper—to update repositories, install, upgrade, and remove software, as well as advanced tasks like searching, viewing package info, handling transactions, configuring repositories, and troubleshooting common issues.

APTLinuxdnf
0 likes · 8 min read
Master Linux Package Managers: apt, yum, dnf, pacman, zypper
MaGe Linux Operations
MaGe Linux Operations
Apr 30, 2024 · Fundamentals

Master DNS: From Resolution Basics to BIND and dnsmasq Deployment

This guide walks through the complete DNS resolution process, explains key terminology, details the hierarchical structure of DNS servers, demonstrates how to use dig for tracing, and provides step‑by‑step instructions for deploying BIND and dnsmasq on Linux systems.

BINDDNSDomain Name System
0 likes · 22 min read
Master DNS: From Resolution Basics to BIND and dnsmasq Deployment
Liangxu Linux
Liangxu Linux
Apr 30, 2024 · Operations

How to Resolve Linux Package Dependency Issues Across Major Distributions

This guide explains runtime and build-time package dependencies on Linux, demonstrates how to use apt, yum, dnf, pacman, and other tools to automatically or manually fix missing packages, version conflicts, and shared‑library problems, and provides practical command examples for each major distribution.

APTLinuxdependency resolution
0 likes · 6 min read
How to Resolve Linux Package Dependency Issues Across Major Distributions
Efficient Ops
Efficient Ops
Apr 29, 2024 · Operations

Accelerate Linux Ops: Fast Deletion, iSCSI Detection & Quick Group Management

This guide presents practical Linux and vSphere techniques—including using rsync for rapid bulk file deletion, detecting newly added iSCSI disks without reboot, safeguarding rm commands, mounting remote filesystems with SSHFS, and quickly adding users to supplementary groups via gpasswd—to boost operational efficiency.

LinuxOperationsgpasswd
0 likes · 10 min read
Accelerate Linux Ops: Fast Deletion, iSCSI Detection & Quick Group Management
Lobster Programming
Lobster Programming
Apr 29, 2024 · Backend Development

Step-by-Step Guide to Installing and Running Kafka on Linux

This article explains what Kafka is, outlines the prerequisites, provides detailed Linux installation steps, configuration tweaks, startup commands, testing procedures, and troubleshooting tips, enabling readers to set up a functional Kafka cluster and produce‑consume messages.

InstallationKafkaLinux
0 likes · 5 min read
Step-by-Step Guide to Installing and Running Kafka on Linux
Liangxu Linux
Liangxu Linux
Apr 28, 2024 · Fundamentals

Master Linux Filesystem Hierarchy: Essential Directories and Command Guide

This guide explains the Linux filesystem hierarchy, detailing the purpose of each standard directory, providing practical command‑line examples, and offering tips for managing configuration files, logs, temporary data, and custom services to improve system administration.

Directory StructureFilesystemLinux
0 likes · 9 min read
Master Linux Filesystem Hierarchy: Essential Directories and Command Guide
Java Tech Enthusiast
Java Tech Enthusiast
Apr 28, 2024 · Operations

Defining Linux Mastery: Skills and Knowledge

Becoming a Linux master means first grasping why operating systems exist, then steadily acquiring fluency with the command line, system configuration, scripting, performance tuning, security, kernel internals, virtualization, containers, networking, and monitoring tools, while continuously learning across distributions to diagnose faults and optimize resources.

DevOpsLinuxScripting
0 likes · 5 min read
Defining Linux Mastery: Skills and Knowledge
Liangxu Linux
Liangxu Linux
Apr 27, 2024 · Information Security

Why Linux Needs Fewer Antivirus Tools: 5 Security Advantages Explained

Linux’s open‑source nature, robust package management, kernel‑level protections, built‑in firewall, and community‑driven security practices result in far fewer malware threats, reducing the need for traditional antivirus software and external firewalls compared to Windows, as outlined in five key reasons.

AntivirusLinuxOpen-source
0 likes · 5 min read
Why Linux Needs Fewer Antivirus Tools: 5 Security Advantages Explained
Open Source Tech Hub
Open Source Tech Hub
Apr 26, 2024 · Information Security

How to Safely Mitigate the glibc CVE‑2024‑2961 Iconv Overflow in PHP

This article explains the glibc CVE‑2024‑2961 buffer overflow in ISO‑2022‑CN‑EXT conversion, how it can be exploited through PHP's iconv extension, and provides practical mitigation steps such as applying distro patches, validating charset inputs, and removing vulnerable modules when patches are unavailable.

CVE-2024-2961IConvLinux
0 likes · 4 min read
How to Safely Mitigate the glibc CVE‑2024‑2961 Iconv Overflow in PHP
Open Source Linux
Open Source Linux
Apr 26, 2024 · Operations

7 Practical Linux Performance Optimization Techniques for Enterprise Systems

This article compiles seven hands‑on Linux performance‑optimization practices—including hardware, kernel, and network tuning, diagnostic commands, memory accounting, swap usage, and TCP parameter adjustments—to help engineers quickly identify and resolve stability and speed issues in production environments.

CPULinuxPerformance Optimization
0 likes · 20 min read
7 Practical Linux Performance Optimization Techniques for Enterprise Systems
Ops Development & AI Practice
Ops Development & AI Practice
Apr 25, 2024 · Cloud Native

How to Keep Docker Containers in Sync with Host Timezone

This guide explains why Docker containers default to UTC, then walks through three practical ways—mounting host timezone files, setting the TZ environment variable, and using timedatectl or scripts—to ensure container time matches the host for reliable logging and scheduling.

ContainerDevOpsDocker Compose
0 likes · 4 min read
How to Keep Docker Containers in Sync with Host Timezone
Deepin Linux
Deepin Linux
Apr 25, 2024 · Fundamentals

Understanding Linux System Calls: Mechanism, Debugging, and Implementation

This article explains how Linux system calls serve as the primary interface between user‑space programs and the kernel, describes the transition from user mode to kernel mode, and provides step‑by‑step debugging examples and source‑code snippets for x86_64 architectures.

AssemblyLinuxSystem Calls
0 likes · 31 min read
Understanding Linux System Calls: Mechanism, Debugging, and Implementation
Liangxu Linux
Liangxu Linux
Apr 24, 2024 · Fundamentals

Unlocking Linux Memory: From Basics to Advanced Allocation Strategies

This comprehensive guide explains Linux memory fundamentals, address space layout, fragmentation, the buddy and slab allocators, kernel and user‑mode memory pools, DMA handling, common programming pitfalls, and practical tools for monitoring memory usage.

DMALinuxMemory Management
0 likes · 19 min read
Unlocking Linux Memory: From Basics to Advanced Allocation Strategies
MaGe Linux Operations
MaGe Linux Operations
Apr 24, 2024 · Operations

Step‑by‑Step Guide to Building a Linux LVS NAT Load Balancer

This tutorial walks through planning the NAT architecture, preparing hosts, configuring Linux route, LVS, and rs servers, installing httpd, setting up ipvsadm load‑balancing rules, testing client access via gateway or direct router IP, and persisting the configuration for a reliable Linux LVS NAT solution.

LVSLinuxNAT
0 likes · 13 min read
Step‑by‑Step Guide to Building a Linux LVS NAT Load Balancer
Lobster Programming
Lobster Programming
Apr 22, 2024 · Fundamentals

Master Lua: What It Is, Key Features, and How to Install on Linux

Lua is a lightweight, high-performance scripting language supporting multiple paradigms, widely used in game development, embedded systems, and web servers; this guide explains its core characteristics, typical applications, and provides step-by-step instructions for downloading, compiling, and configuring Lua on a Linux system.

Game DevelopmentInstallationLinux
0 likes · 3 min read
Master Lua: What It Is, Key Features, and How to Install on Linux
21CTO
21CTO
Apr 22, 2024 · Operations

Discover Guider: A Python‑Powered Linux Observability Suite with 150+ Commands

Guider, a Python‑based Linux observability suite created by Hyundai engineer Peace Lee, offers over 150 command‑line tools for real‑time performance monitoring, resource tracing, automated reporting, and visualizations, enabling developers to diagnose slow startups, crashes, GPU stalls, and system resets with microsecond precision.

CLILinuxMonitoring
0 likes · 7 min read
Discover Guider: A Python‑Powered Linux Observability Suite with 150+ Commands
21CTO
21CTO
Apr 22, 2024 · Information Security

Linus Torvalds on Security, AI Hype, and the Future of Open‑Source Trust

During a candid “fireside chat” at the Linux Foundation North America Open Source Summit, Linus Torvalds discusses the challenges of hardware bugs, security vulnerabilities, AI hype, RISC‑V concerns, and the importance of trust and community in sustaining Linux’s open‑source ecosystem.

AILinuxOpen-source
0 likes · 9 min read
Linus Torvalds on Security, AI Hype, and the Future of Open‑Source Trust
Liangxu Linux
Liangxu Linux
Apr 21, 2024 · Operations

Master Linux System Monitoring: top, free, vmstat, iostat, netstat and More

This guide provides a comprehensive overview of essential Linux system monitoring commands—including top, free, vmstat, iostat, mpstat, sar, netstat, uptime, ps, watch, strace, and lsof—detailing their syntax, key options, interactive controls, and how to interpret their output for effective performance analysis.

FreeLinuxiostat
0 likes · 32 min read
Master Linux System Monitoring: top, free, vmstat, iostat, netstat and More
Liangxu Linux
Liangxu Linux
Apr 19, 2024 · Operations

Step-by-Step Guide to Diagnose High CPU Usage on Linux

This guide walks you through checking CPU usage, system load, resource consumption, problematic processes, system logs, and performance bottlenecks on a Linux server using common command‑line tools such as top, uptime, pidstat, strace, tail, and perf.

CPULinuxOperations
0 likes · 3 min read
Step-by-Step Guide to Diagnose High CPU Usage on Linux
Liangxu Linux
Liangxu Linux
Apr 18, 2024 · Fundamentals

Mastering Linux Memory Management: Structures, Allocation Algorithms, and Common Pitfalls

This article provides a comprehensive guide to Linux memory management, covering memory fundamentals, address spaces, MMU translation, segmentation and paging, the buddy and slab allocation algorithms, kernel and user memory pools, typical usage scenarios, common bugs, and practical tools for monitoring and debugging memory usage.

DMALinuxMemory Management
0 likes · 25 min read
Mastering Linux Memory Management: Structures, Allocation Algorithms, and Common Pitfalls
Ops Development & AI Practice
Ops Development & AI Practice
Apr 18, 2024 · Operations

How to Check and Fix Linux File Permissions with Go

This article explains why proper file permissions and ownership are crucial for Linux security and provides a step‑by‑step Go implementation that reads file metadata, validates and corrects owners and modes, includes full example code, and discusses integration tips and required privileges.

File PermissionsGoLinux
0 likes · 6 min read
How to Check and Fix Linux File Permissions with Go
MaGe Linux Operations
MaGe Linux Operations
Apr 18, 2024 · Operations

How to Configure Multiple Default Gateways and Dual NICs on Linux

Learn how to set up default gateways, manage multiple network interfaces, add static routes, and use iproute2 and bonding on Linux to achieve dual‑NIC configurations, load balancing and redundancy, with step‑by‑step commands and examples for various network scenarios.

BondingDefault GatewayLinux
0 likes · 18 min read
How to Configure Multiple Default Gateways and Dual NICs on Linux
Tencent Architect
Tencent Architect
Apr 18, 2024 · Operations

Achieving Six‑Nines Availability in OpenCloudOS: Full‑Stack Kernel Quality and Fault‑Recovery Strategies

The article explains how OpenCloudOS, a fully self‑developed Linux operating system, attains industry‑leading six‑nine (99.9999%) availability by strengthening kernel quality, implementing comprehensive CI testing, managing vendor drivers, handling upstream bugs, and deploying automated crash analysis and rapid recovery mechanisms.

CIKernel QualityLinux
0 likes · 10 min read
Achieving Six‑Nines Availability in OpenCloudOS: Full‑Stack Kernel Quality and Fault‑Recovery Strategies
Open Source Linux
Open Source Linux
Apr 18, 2024 · Information Security

Essential Linux Security Hardening Checklist for Red Hat Systems

This guide outlines a comprehensive set of security configurations for Red Hat Linux, covering shared account checks, redundant account locking, root remote login restrictions, password complexity and lifespan policies, directory permissions, logging, SSH hardening, service disabling, and patch management to ensure robust system protection.

LinuxPassword policySystem Hardening
0 likes · 22 min read
Essential Linux Security Hardening Checklist for Red Hat Systems
Liangxu Linux
Liangxu Linux
Apr 17, 2024 · Operations

Master Linux System Logs: Essential Commands, Files, and Tools

This guide explains how to view and manage Linux system logs using command‑line utilities like journalctl and dmesg, direct file access, and graphical tools, providing practical examples, common log file locations, and tips for filtering and monitoring log output.

LinuxLog ManagementSysadmin
0 likes · 5 min read
Master Linux System Logs: Essential Commands, Files, and Tools
dbaplus Community
dbaplus Community
Apr 17, 2024 · Databases

How to Diagnose and Fix 900% CPU Spikes in MySQL and Java Processes

This guide explains why MySQL or Java processes can consume 900% CPU, outlines step‑by‑step diagnostics using tools like top, show processlist, jstack, and provides concrete fixes such as adding indexes, disabling slow logs, using caches, and optimizing thread handling.

LinuxMySQLPerformance
0 likes · 11 min read
How to Diagnose and Fix 900% CPU Spikes in MySQL and Java Processes
MaGe Linux Operations
MaGe Linux Operations
Apr 17, 2024 · Operations

Mastering Linux Process Management: Concepts, Commands, and Scheduling

This guide explains Linux process fundamentals—including definitions, how to view processes with ps and pstree, terminate them with kill, and schedule tasks using at and crontab—providing command syntax, options, and practical examples for effective process monitoring and periodic scheduling.

LinuxSchedulingcrontab
0 likes · 6 min read
Mastering Linux Process Management: Concepts, Commands, and Scheduling
MaGe Linux Operations
MaGe Linux Operations
Apr 14, 2024 · Fundamentals

Master Linux File Permissions: From chmod to ACL and umask

This guide explains Linux file permission concepts—including owner, group, and others permissions, numeric and symbolic representations, default settings, the role of umask, and advanced features like ACLs, special bits, and immutable attributes—while providing practical command examples for managing files and directories securely.

ACLFile PermissionsLinux
0 likes · 21 min read
Master Linux File Permissions: From chmod to ACL and umask
Selected Java Interview Questions
Selected Java Interview Questions
Apr 13, 2024 · Backend Development

Recovering MySQL Data from a Deleted Docker Container

This guide walks through locating the Docker volume of a removed MySQL container, creating a new container with the same image, and swapping the volumes to restore the original database, providing step‑by‑step commands and screenshots for successful data recovery.

Data RecoveryLinuxMySQL
0 likes · 4 min read
Recovering MySQL Data from a Deleted Docker Container
Liangxu Linux
Liangxu Linux
Apr 13, 2024 · Fundamentals

Master lscpu: Inspect CPU Architecture Details on Linux

This guide introduces the Linux lscpu command, explains its syntax and common options, provides example outputs in default, parsable and extended formats, clarifies each field's meaning, and offers practical usage notes for accurate CPU information retrieval.

CPUCommand LineHardware
0 likes · 11 min read
Master lscpu: Inspect CPU Architecture Details on Linux
Liangxu Linux
Liangxu Linux
Apr 13, 2024 · Operations

Master Linux Network Interface Management: Essential Commands and Real-World Examples

This guide walks Linux system administrators through essential network interface commands—such as ifconfig, ip, route, netstat, traceroute, ping, ss, nmcli, iw, ethtool, firewall-cmd, and iptables—providing clear syntax, practical examples, and tips for configuring IP addresses, routes, DNS, VPNs, and firewall rules.

LinuxNetwork ConfigurationShell Commands
0 likes · 8 min read
Master Linux Network Interface Management: Essential Commands and Real-World Examples
Open Source Linux
Open Source Linux
Apr 11, 2024 · Operations

7 Practical Linux Performance Optimization Techniques Every Engineer Should Know

This article consolidates community‑sourced Linux performance optimization practices, covering key factors that affect system speed, rapid troubleshooting steps for CPU, memory, disk and network issues, load‑analysis methods, top‑resource identification commands, memory‑stat nuances, swap usage scenarios, and detailed TCP tuning recommendations.

LinuxTCPoptimization
0 likes · 20 min read
7 Practical Linux Performance Optimization Techniques Every Engineer Should Know
DevOps Operations Practice
DevOps Operations Practice
Apr 10, 2024 · Operations

Common apt Commands for Managing Packages on Ubuntu

This article provides a concise guide to using the apt package manager on Ubuntu, covering installation, updating package lists, upgrading, searching, displaying information, removing packages, and cleaning up unused files with clear command examples.

APTCommand LineLinux
0 likes · 4 min read
Common apt Commands for Managing Packages on Ubuntu
Liangxu Linux
Liangxu Linux
Apr 10, 2024 · Operations

Master Advanced tar Techniques: Compression, Incremental Backups, and Encryption

This guide explains the tar command’s advanced capabilities—including adding files to existing archives, using gzip or bzip2 compression, extracting specific files with wildcards, creating incremental backups, excluding paths, encrypting archives, limiting archive size, and directing output to custom directories—providing clear examples for each scenario.

BackupCommand LineFile Compression
0 likes · 6 min read
Master Advanced tar Techniques: Compression, Incremental Backups, and Encryption
Efficient Ops
Efficient Ops
Apr 10, 2024 · Information Security

How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide

This article walks through the symptoms, root causes, forensic commands, and remediation actions taken to investigate and clean a Linux server that was compromised, highlighting key security lessons such as tightening SSH access, monitoring critical files, and restoring locked system utilities.

Cron JobsForensicsLD_PRELOAD
0 likes · 15 min read
How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide
Open Source Linux
Open Source Linux
Apr 10, 2024 · Operations

Why a German State Is Ditching Windows for Linux: The Quest for Digital Sovereignty

After a successful pilot, the northern German state of Schleswig‑Holstein announced plans to replace 30,000 PCs running Microsoft Windows and Office with Linux and LibreOffice, emphasizing digital sovereignty, reduced reliance on proprietary cloud services, and the potential to boost local open‑source development and employment.

DigitalSovereigntyGovernmentITLinux
0 likes · 4 min read
Why a German State Is Ditching Windows for Linux: The Quest for Digital Sovereignty
Liangxu Linux
Liangxu Linux
Apr 9, 2024 · Fundamentals

How Linux Detects Headphone Plug/Unplug Events via the ASoC Jack Driver

This article explains the Linux kernel's built‑in headphone jack detection mechanism, detailing the asoc_simple_init_jack function, device‑tree GPIO lookup, jack registration, event reporting flow, and highlights platform‑specific alternatives for Rockchip and MediaTek hardware.

ASoCGPIOJack Detection
0 likes · 10 min read
How Linux Detects Headphone Plug/Unplug Events via the ASoC Jack Driver
Liangxu Linux
Liangxu Linux
Apr 9, 2024 · Fundamentals

How to Handle Signals in Multithreaded Linux Programs (C Example)

This article explains the differences between threads and processes in Linux, introduces the concept of POSIX signals, describes how signals are delivered and handled in multithreaded programs, and provides a complete C example demonstrating proper signal handling across threads.

LinuxPOSIXThreads
0 likes · 5 min read
How to Handle Signals in Multithreaded Linux Programs (C Example)
Open Source Linux
Open Source Linux
Apr 9, 2024 · Operations

Finding the Process That Writes a File on CentOS 7 with SystemTap

This guide explains how to monitor disk usage on a CentOS 7 server, generate periodic snapshots with iostat, sar, and pidstat, schedule them via at, and ultimately locate the exact process writing to a specific file by extracting its inode and tracing it with SystemTap’s inodewatch script, handling kernel‑devel and debuginfo requirements.

CentOSLinuxSystemTap
0 likes · 12 min read
Finding the Process That Writes a File on CentOS 7 with SystemTap
MaGe Linux Operations
MaGe Linux Operations
Apr 8, 2024 · Operations

Build a Highly Available Load Balancer with LVS and Keepalived

This guide explains how to design and deploy a highly available web load‑balancing cluster using Linux Virtual Server (LVS) together with Keepalived, covering architecture, required software, configuration steps for both master and backup nodes, real‑server setup, and HA testing procedures.

LVSLinuxhigh availability
0 likes · 12 min read
Build a Highly Available Load Balancer with LVS and Keepalived
Java Architect Essentials
Java Architect Essentials
Apr 7, 2024 · Cloud Computing

Deploying a Private Nextcloud Instance with Docker on Alibaba Cloud

This tutorial walks through installing Docker on an Alibaba Cloud server, pulling and running the Nextcloud container, configuring firewall ports, initializing the service, and verifying the private cloud storage works, providing step‑by‑step commands and screenshots for a complete deployment.

Alibaba CloudContainerLinux
0 likes · 5 min read
Deploying a Private Nextcloud Instance with Docker on Alibaba Cloud
Liangxu Linux
Liangxu Linux
Apr 6, 2024 · Operations

Master Linux File Extended Attributes with the attr Command

This guide explains what Linux extended attributes are, distinguishes user and system types, and provides step‑by‑step examples of adding, listing, and removing attributes with the attr command, plus practical use‑cases such as tagging, labeling, metadata storage, and custom extensions.

Extended AttributesLinuxattr command
0 likes · 6 min read
Master Linux File Extended Attributes with the attr Command
Liangxu Linux
Liangxu Linux
Apr 6, 2024 · Fundamentals

Why Ubuntu Remains the Top Choice Among Linux Distributions

The article compares Ubuntu with nine other major Linux distributions, highlighting each distro's history, strengths, and drawbacks, and explains why Ubuntu’s longevity, ease of use, hardware support, and community make it the preferred choice for both beginners and seasoned users.

LinuxOpen-sourceOperating System
0 likes · 11 min read
Why Ubuntu Remains the Top Choice Among Linux Distributions
MaGe Linux Operations
MaGe Linux Operations
Apr 5, 2024 · Operations

Master Linux User and Group Management: Files, Commands, and Best Practices

This guide explains Linux user and group fundamentals, detailing UID/GID concepts, primary and secondary groups, system, regular and root users, the structure of key files such as /etc/passwd, /etc/shadow, /etc/group, /etc/gshadow, /etc/skel, /etc/login.defs and /etc/default/useradd, and provides comprehensive usage examples for management commands like useradd, newusers, groupadd, passwd, chpasswd, chage, usermod, and related utilities.

Linuxcommandsgroup-management
0 likes · 29 min read
Master Linux User and Group Management: Files, Commands, and Best Practices
Java Tech Enthusiast
Java Tech Enthusiast
Apr 5, 2024 · Fundamentals

Understanding Loopback Addresses, Ping, and Why 127.0.0.1 Works Offline

The IPv4 loopback address 127.0.0.1 (also reachable via the hostname localhost) is reserved for internal communication, so pinging it never leaves the host and works even with the network cable unplugged, while 0.0.0.0 is an unspecified address used only for binding to all interfaces and cannot be pinged.

IPv4IPv6Linux
0 likes · 13 min read
Understanding Loopback Addresses, Ping, and Why 127.0.0.1 Works Offline
Liangxu Linux
Liangxu Linux
Apr 4, 2024 · Operations

Master Linux Disk Management: Partition, Format, and Mount Like a Pro

This guide walks you through Linux disk management fundamentals, covering how to partition disks with fdisk and gdisk, create filesystems using mkfs, format partitions, mount and unmount devices, configure automatic mounts via /etc/fstab, and handle special cases such as ISO and Windows share mounts.

LinuxMountingPartitioning
0 likes · 38 min read
Master Linux Disk Management: Partition, Format, and Mount Like a Pro
Open Source Linux
Open Source Linux
Apr 3, 2024 · Fundamentals

What Is Wubuntu? A Linux Distro That Replicates the Windows Experience

Wubuntu, also called "Windows Ubuntu," is an Ubuntu‑based operating system that fully mimics Windows' appearance and functionality, runs without TPM or Secure Boot, integrates Wine for .exe and .msi compatibility, and even supports Android apps, offering both free and paid editions.

LinuxUbuntuWine
0 likes · 2 min read
What Is Wubuntu? A Linux Distro That Replicates the Windows Experience
dbaplus Community
dbaplus Community
Mar 31, 2024 · Databases

How to Seamlessly Upgrade MySQL 5.7 to 8.0: Step‑by‑Step Guide and Common Pitfalls

This article walks through the complete process of upgrading MySQL 5.7.43 to 8.0.34 on CentOS 7, covering lifecycle background, new 8.0 features, pre‑upgrade checks, data backup, configuration changes, installation, upgrade execution, post‑upgrade verification, and troubleshooting of typical SSL and host‑blocking issues.

LinuxMySQLconfiguration
0 likes · 21 min read
How to Seamlessly Upgrade MySQL 5.7 to 8.0: Step‑by‑Step Guide and Common Pitfalls