Tagged articles
5000 articles
Page 33 of 50
Open Source Linux
Open Source Linux
Mar 9, 2022 · Fundamentals

Master Linux Shell: Core Concepts, Commands, and Scripting Tricks

This guide explains what a Linux shell is, how prompts and carriage returns work, the usage of echo, quoting rules, variable assignment and export, differences between exec and source, command grouping, parameter expansion, arrays, test operators, I/O redirection, and control‑flow structures, providing concise examples for each.

LinuxScripting
0 likes · 11 min read
Master Linux Shell: Core Concepts, Commands, and Scripting Tricks
Ops Development Stories
Ops Development Stories
Mar 7, 2022 · Operations

Master Linux Performance: From CPU Load to Memory Optimization

This comprehensive guide explains Linux performance fundamentals, covering key metrics like throughput and latency, how to interpret average load, CPU context switching, memory management, and the most effective tools and techniques for diagnosing and optimizing system performance.

CPULinuxmemory
0 likes · 44 min read
Master Linux Performance: From CPU Load to Memory Optimization
Open Source Linux
Open Source Linux
Mar 7, 2022 · Cloud Native

Mastering Podman: A Docker‑Compatible, Daemon‑Free Container Runtime

This article explains what Podman is, highlights its key architectural differences from Docker, provides Docker‑compatible command references, shows how to install and configure accelerators, demonstrates rootless operation, and covers essential configuration files and volume handling for secure container management on Linux.

Docker alternativeLinuxOCI
0 likes · 16 min read
Mastering Podman: A Docker‑Compatible, Daemon‑Free Container Runtime
MaGe Linux Operations
MaGe Linux Operations
Mar 6, 2022 · Information Security

How Linux’s Random Number Generator Got a 8450% Speed Boost in 5.18

Under Jason Donenfeld’s leadership, Linux kernel’s random number generator was overhauled in versions 5.17 and 5.18, replacing SHA1 with BLAKE2s and shifting from per‑NUMA to per‑CPU structures, delivering up to a 131% speed increase and an astonishing 8450% boost in getrandom() performance on multi‑core systems.

BLAKE2sLinuxPerformance
0 likes · 3 min read
How Linux’s Random Number Generator Got a 8450% Speed Boost in 5.18
IT Services Circle
IT Services Circle
Mar 6, 2022 · Fundamentals

Understanding Localhost (127.0.0.1) Network I/O in the Linux Kernel

This article explains how Linux handles local network I/O for 127.0.0.1, detailing the differences from cross‑machine communication, the routing decisions, the loopback device driver, soft‑interrupt processing, and the complete kernel execution flow for both sending and receiving packets.

LinuxNetwork IONetworking
0 likes · 15 min read
Understanding Localhost (127.0.0.1) Network I/O in the Linux Kernel
Liangxu Linux
Liangxu Linux
Mar 5, 2022 · Fundamentals

Master Bash Shell: Core Concepts, Commands, and Scripting Tricks

This guide explains why the command‑line interface is called a Shell, clarifies prompts and carriage returns, and walks through essential Bash features such as echo options, quoting rules, variable export, exec vs source, grouping, parameter expansion, arrays, arithmetic, redirection, conditional statements, loops, and control flow operators.

BashCommand LineControl structures
0 likes · 12 min read
Master Bash Shell: Core Concepts, Commands, and Scripting Tricks
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Mar 4, 2022 · Operations

Understanding Linux mlock and munlock: Memory Locking and Reclamation Mechanisms on arm64

On arm64 Linux kernels (e.g., 5.10.27), the mlock system call marks VMAs with VM_LOCKED, forces page faults, sets the PG_mlocked flag and moves pages into the unevictable LRU so they cannot be reclaimed, while munlock clears these flags and returns pages to regular LRU lists, guaranteeing resident memory for latency‑sensitive applications.

LRULinuxMemory Management
0 likes · 7 min read
Understanding Linux mlock and munlock: Memory Locking and Reclamation Mechanisms on arm64
ITPUB
ITPUB
Mar 3, 2022 · Operations

Unlock Linux Performance: Master Metrics, Tools, and Optimization Techniques

This guide explains Linux performance optimization by defining key metrics such as throughput, latency, average load, and CPU usage, describing how to select and interpret tools like vmstat, pidstat, perf, and dstat, and offering concrete steps to diagnose and fix CPU, memory, I/O, and context‑switch bottlenecks.

CPULinuxMonitoring
0 likes · 46 min read
Unlock Linux Performance: Master Metrics, Tools, and Optimization Techniques
Efficient Ops
Efficient Ops
Mar 1, 2022 · Operations

Master Linux Performance: Key Metrics, Tools, and Optimization Techniques

This guide explains Linux performance optimization by defining core metrics such as throughput, latency, and average load, describing how to select and benchmark indicators, outlining essential analysis tools like vmstat, pidstat, and perf, and providing practical CPU and memory tuning strategies to eliminate bottlenecks.

CPULinuxMonitoring
0 likes · 47 min read
Master Linux Performance: Key Metrics, Tools, and Optimization Techniques
Laravel Tech Community
Laravel Tech Community
Feb 28, 2022 · Backend Development

nginxWebUI: Graphical Management Tool for Nginx Configuration and Deployment

nginxWebUI is a web‑based graphical interface that simplifies configuring, managing, and deploying Nginx—including HTTP/TCP forwarding, reverse proxy, load balancing, SSL certificate automation, and multi‑server cluster support—while providing Docker images and detailed installation steps for Linux, Windows, and macOS environments.

LinuxNGINXconfiguration
0 likes · 9 min read
nginxWebUI: Graphical Management Tool for Nginx Configuration and Deployment
Architects' Tech Alliance
Architects' Tech Alliance
Feb 28, 2022 · Fundamentals

Comprehensive Guide to Linux Memory Management and Allocation Algorithms

This article provides an in‑depth overview of Linux memory architecture, including address spaces, segmentation and paging, memory allocation strategies such as the buddy and slab allocators, kernel and user‑space memory pools, DMA considerations, common pitfalls, and practical tools for monitoring and optimizing memory usage.

DMALinuxMemory Management
0 likes · 19 min read
Comprehensive Guide to Linux Memory Management and Allocation Algorithms
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Feb 25, 2022 · Fundamentals

Inside Linux’s fork: How the Kernel Creates a New Process

This article dissects the Linux kernel’s fork implementation, explaining why the child receives a return value of 0, how parent and child share code execution, the internal steps of sys_fork, kernel_clone, copy_process, thread handling, scheduling initialization, and the final insertion of the new task into the run‑queue.

LinuxSchedulingfork
0 likes · 10 min read
Inside Linux’s fork: How the Kernel Creates a New Process
ByteDance Terminal Technology
ByteDance Terminal Technology
Feb 24, 2022 · Mobile Development

Exploring ByteDance's iOS Automation Testing Driver Tool BDC: Architecture, Features, and Implementation

This article details the background, functional capabilities, development journey, technical architecture, and deployment experience of ByteDance's iOS automation testing driver tool BDC, illustrating how it automates device interaction, app management, UI control, and large‑scale testing on both macOS and Linux environments.

Automation testingLinuxUI Interaction
0 likes · 13 min read
Exploring ByteDance's iOS Automation Testing Driver Tool BDC: Architecture, Features, and Implementation
Open Source Linux
Open Source Linux
Feb 23, 2022 · Operations

20 Proven Linux Server Performance Tweaks Every Sysadmin Should Know

Learn how to boost Linux server efficiency with 20 practical tips—from kernel elevator adjustments and disabling unnecessary daemons to optimizing TCP, choosing the right filesystem, and leveraging performance tools like top, vmstat, iostat, free, and sar—ensuring faster, more secure, and cost-effective operations.

Kernel TuningLinuxoptimization
0 likes · 14 min read
20 Proven Linux Server Performance Tweaks Every Sysadmin Should Know
Efficient Ops
Efficient Ops
Feb 22, 2022 · Operations

Mastering ssar: A Deep Dive into Alibaba’s Open‑Source System Performance Tool

ssar is Alibaba’s open‑source system performance monitoring tool that extends traditional sar capabilities with comprehensive machine‑level, process‑level, and load metrics, offering rapid development, flexible configuration, and advanced diagnostics such as load5s, thread analysis, and custom Python query extensions for detailed OS troubleshooting.

LinuxOpen-sourcediagnostics
0 likes · 29 min read
Mastering ssar: A Deep Dive into Alibaba’s Open‑Source System Performance Tool
Top Architect
Top Architect
Feb 22, 2022 · Fundamentals

Understanding DMA and Zero‑Copy Techniques in Linux

This article explains how DMA offloads memory‑to‑device data transfers, reduces the four data copies and context switches of traditional I/O, and introduces zero‑copy methods such as sendfile, mmap and Direct I/O, illustrating their mechanisms, advantages, limitations, and real‑world use cases like Kafka and MySQL.

DMADirect I/OI/O optimization
0 likes · 15 min read
Understanding DMA and Zero‑Copy Techniques in Linux
ITPUB
ITPUB
Feb 21, 2022 · Backend Development

Unlocking Multi‑Process Server Speed: How Linux REUSEPORT Works

This article explains why Linux kernels 3.9+ allow multiple processes to bind the same port, how the REUSEPORT option implements kernel‑level load balancing, and provides step‑by‑step examples showing configuration, code snippets, and performance verification.

BackendLinuxSO_REUSEPORT
0 likes · 14 min read
Unlocking Multi‑Process Server Speed: How Linux REUSEPORT Works
IT Services Circle
IT Services Circle
Feb 21, 2022 · Fundamentals

Intel Enables Paid Core Unlocking via SDSi in Linux Kernel 5.18

Intel's new SDSi feature, now supported in Linux kernel 5.18, lets customers pay to unlock additional CPU cores and potentially other performance enhancements, a strategy originally designed for data‑center processors that could reshape how processor capabilities are monetized.

CPUIntelLinux
0 likes · 4 min read
Intel Enables Paid Core Unlocking via SDSi in Linux Kernel 5.18
Open Source Linux
Open Source Linux
Feb 21, 2022 · Operations

Mastering LVS: From Basics to MySQL High Availability with Keepalived

This article provides a comprehensive guide to Linux Virtual Server (LVS), covering its history, four operating modes, scheduling algorithms, installation steps, MySQL load‑balancing configuration, ARP suppression techniques, and high‑availability setup using keepalived, all illustrated with diagrams and code snippets.

IPVSLVSLinux
0 likes · 23 min read
Mastering LVS: From Basics to MySQL High Availability with Keepalived
Architect
Architect
Feb 19, 2022 · Fundamentals

Understanding DMA and Zero‑Copy Techniques in Linux I/O

This article explains how DMA offloads memory‑to‑device data transfers, reduces the four data copies and context switches of traditional I/O, and introduces zero‑copy mechanisms such as sendfile, mmap and Direct I/O, with practical examples like Kafka and MySQL.

DMADirect I/OI/O optimization
0 likes · 15 min read
Understanding DMA and Zero‑Copy Techniques in Linux I/O
IT Services Circle
IT Services Circle
Feb 18, 2022 · Operations

Top Command and Its Modern Alternatives for Linux System Monitoring

This article explains the Linux top command syntax, options, and interactive hotkeys, interprets its output, and then presents a curated list of contemporary replacements—including bashtop, bpytop, btop, bottom, glances, gotop, gtop, htop, nvtop, vtop, and zenith—along with their key features, installation steps for various distributions, and basic usage examples.

CLI toolsLinuxsystem-monitoring
0 likes · 18 min read
Top Command and Its Modern Alternatives for Linux System Monitoring
IT Services Circle
IT Services Circle
Feb 17, 2022 · Operations

Understanding the netstat Command and Its Common Options

This article explains the purpose, output format, and frequently used options of the cross‑platform netstat command, illustrating how to list active TCP/UDP connections, UNIX domain sockets, and various statistics, and notes modern replacements such as ss and ip.

LinuxNetwork MonitoringTCP
0 likes · 7 min read
Understanding the netstat Command and Its Common Options
Liangxu Linux
Liangxu Linux
Feb 15, 2022 · Operations

Mastering APT: Essential Commands for Ubuntu & Debian Package Management

Learn how to efficiently manage Debian-based packages on Ubuntu and other Linux distributions using APT, covering updating the package index, upgrading system and individual packages, installing and removing software, handling dependencies, and leveraging powerful commands like list, search, and show for comprehensive system maintenance.

APTLinuxSystem Administration
0 likes · 7 min read
Mastering APT: Essential Commands for Ubuntu & Debian Package Management
Efficient Ops
Efficient Ops
Feb 14, 2022 · Operations

20 Essential Linux Terminal Tricks to Boost Your Productivity

This article presents a curated collection of practical Linux command‑line shortcuts and tips—ranging from tab completion and directory navigation to log monitoring and command chaining—that can dramatically reduce keystrokes, prevent common errors, and streamline everyday system‑administration tasks.

Command LineLinuxProductivity
0 likes · 12 min read
20 Essential Linux Terminal Tricks to Boost Your Productivity
IT Services Circle
IT Services Circle
Feb 13, 2022 · Fundamentals

Does a TCP Connection Persist After Unplugging the Network Cable?

Unplugging a network cable does not immediately terminate a TCP connection; the kernel’s socket state remains ESTABLISHED, and the connection’s fate depends on data transmission, retransmission limits, TCP keepalive settings, and whether either side detects a failure.

KeepaliveLinuxSocket
0 likes · 10 min read
Does a TCP Connection Persist After Unplugging the Network Cable?
IT Services Circle
IT Services Circle
Feb 13, 2022 · Fundamentals

Mark Shuttleworth: From Space Tourist to Founder of Ubuntu

Mark Shuttleworth, the South African entrepreneur who became the first African in space, later founded Canonical and created the Ubuntu Linux distribution, blending his idealistic Ubuntu philosophy with open‑source development to make free software accessible worldwide.

CanonicalDebianLinux
0 likes · 10 min read
Mark Shuttleworth: From Space Tourist to Founder of Ubuntu
Efficient Ops
Efficient Ops
Feb 9, 2022 · Operations

How Linux Namespaces and Cgroups Enable Resource Isolation and Limits

This article explains how Linux namespaces provide resource isolation while cgroups enforce resource limits, detailing their types, system calls, configuration steps, and practical Go code examples to demonstrate CPU share control in container-like environments.

ContainersLinuxNamespaces
0 likes · 5 min read
How Linux Namespaces and Cgroups Enable Resource Isolation and Limits
Laravel Tech Community
Laravel Tech Community
Feb 7, 2022 · Operations

Linux Basic Operations and Command Reference

This article provides a comprehensive reference of essential Linux commands and procedures, covering system shutdown and reboot, hardware and environment inspection, file and directory management, user and permission handling, networking utilities, performance monitoring tools, and common text processing techniques for administrators and developers.

Command LineLinuxNetworking
0 likes · 18 min read
Linux Basic Operations and Command Reference
MaGe Linux Operations
MaGe Linux Operations
Feb 5, 2022 · Operations

Essential Linux Bash Scripts for Server Operations and Automation

This article presents a collection of practical Bash scripts for Linux servers, covering DOS attack IP blocking, alert emailing, MySQL backup (single and multi‑loop), Nginx log rotation and analysis, real‑time network traffic monitoring, system initialization, and disk usage checks across multiple hosts.

BashLinuxMonitoring
0 likes · 10 min read
Essential Linux Bash Scripts for Server Operations and Automation
Refining Core Development Skills
Refining Core Development Skills
Jan 28, 2022 · Information Security

Detecting a Hidden Mining Virus in a Linux System: A Narrative

A dramatized Linux security incident shows how administrators use commands like top, ps, netstat, and the unhide tool to discover hidden mining processes, isolate suspicious network connections, and finally terminate the malicious hidden PID, illustrating practical techniques for rootkit detection and response.

LinuxRootkit DetectionSystem Calls
0 likes · 7 min read
Detecting a Hidden Mining Virus in a Linux System: A Narrative
Open Source Linux
Open Source Linux
Jan 28, 2022 · Fundamentals

Why Disk Space Stays Full After Deleting Files? Inside Linux VFS and Inodes

Even when a Linux system reports a full disk, deleted files may still occupy space because active processes keep them open; using commands like df, du, and lsof reveals hidden usage, and understanding the virtual file system, inode structures, and link management explains how to release the space.

Filesystem FundamentalsLinuxdisk space
0 likes · 11 min read
Why Disk Space Stays Full After Deleting Files? Inside Linux VFS and Inodes
ITPUB
ITPUB
Jan 27, 2022 · Fundamentals

Why Does Linux Need Complex Memory Management? Inside Virtual Memory, malloc, and OOM

This article explains the reasons behind Linux's sophisticated memory management, covering virtual memory mechanisms, page tables, MMU/TLB interactions, page fault handling, the layout of a process's address space, glibc's malloc internals, memory reclamation techniques, and the OOM killer's decision process.

LinuxOOMVirtual Memory
0 likes · 33 min read
Why Does Linux Need Complex Memory Management? Inside Virtual Memory, malloc, and OOM
dbaplus Community
dbaplus Community
Jan 25, 2022 · Cloud Native

Master Podman: A Complete Guide to Daemonless Container Management

This article provides a comprehensive overview of Podman, an open‑source, daemon‑less container runtime, comparing it with Docker, detailing its architecture, installation, configuration, common commands, image building, registry acceleration, user namespace setup, volume handling, and rootless port mapping for Linux systems.

Container ManagementDocker alternativeLinux
0 likes · 19 min read
Master Podman: A Complete Guide to Daemonless Container Management
21CTO
21CTO
Jan 24, 2022 · Operations

Master Linux Performance Monitoring: Essential Tools and Metrics

This guide explains how to monitor Linux server performance using built‑in tools such as top, vmstat, pidstat, iostat, netstat, sar and tcpdump, detailing the metrics each provides and how to interpret them for CPU, memory, disk I/O and network troubleshooting.

LinuxSystem Administrationiostat
0 likes · 15 min read
Master Linux Performance Monitoring: Essential Tools and Metrics
21CTO
21CTO
Jan 22, 2022 · Information Security

What’s Driving the Surge of Linux‑Based IoT Malware in 2021?

The article examines how the proliferation of Linux‑powered IoT devices has made them prime targets for malware families like XorDDoS, Mirai and Mozi, highlighting their rapid growth, attack techniques, and recommended defensive measures for operators.

BotnetDDoSInformation Security
0 likes · 8 min read
What’s Driving the Surge of Linux‑Based IoT Malware in 2021?
Open Source Linux
Open Source Linux
Jan 21, 2022 · Fundamentals

Why Traditional System Call I/O Slows Down Linux Applications—and How to Optimize It

Traditional Linux I/O using read() and write() involves multiple CPU and DMA copies and context switches, while modern techniques like zero‑copy, multiplexing, and page‑cache optimization reduce overhead; this article explains the classic I/O flow, read/write operations, network and disk I/O, and high‑performance strategies such as zero‑copy and Direct I/O.

I/OLinuxPageCache
0 likes · 12 min read
Why Traditional System Call I/O Slows Down Linux Applications—and How to Optimize It
Python Programming Learning Circle
Python Programming Learning Circle
Jan 19, 2022 · Information Security

File Transfer Techniques for Penetration Testing: Linux and Windows Download Commands

This article compiles common file download commands and tools used in penetration testing for both Linux and Windows environments, covering utilities such as wget, curl, axel, aria2, PowerShell, certutil, bitsadmin, and others, with example syntax for direct, background, and resumable transfers.

Command LineFile DownloadLinux
0 likes · 13 min read
File Transfer Techniques for Penetration Testing: Linux and Windows Download Commands
IT Xianyu
IT Xianyu
Jan 19, 2022 · Databases

Understanding Linux Memory Usage, Buff/Cache Cleanup, and SQL Join Optimization

This article explains how to inspect and clear Linux memory buffers, details the information shown by the free command, and provides a comprehensive overview of SQL join types, their performance impact, and optimization techniques such as indexing, join buffer tuning, and algorithm choices.

BuffCacheDatabase PerformanceJOIN optimization
0 likes · 7 min read
Understanding Linux Memory Usage, Buff/Cache Cleanup, and SQL Join Optimization
Ops Development Stories
Ops Development Stories
Jan 19, 2022 · Cloud Native

Why PID 1 Matters: Unraveling Linux Init and Docker Container Signals

Linux’s PID 1, the init process, is the first user‑space program that spawns all other processes, and in Docker containers it becomes the container’s root process, handling signals uniquely; understanding its behavior and using tools like Tini are essential for reliable container orchestration.

LinuxPID 1container signals
0 likes · 9 min read
Why PID 1 Matters: Unraveling Linux Init and Docker Container Signals
Open Source Linux
Open Source Linux
Jan 18, 2022 · Operations

Keep Linux Jobs Running After SSH Disconnect with &, nohup, screen

Learn how to prevent Linux processes from terminating when your SSH session ends by using background execution with &, the nohup command, job control shortcuts like ctrl+z, jobs, fg, bg, and the screen utility, including installation, session management, and practical examples.

LinuxSSHbackground processes
0 likes · 7 min read
Keep Linux Jobs Running After SSH Disconnect with &, nohup, screen
Efficient Ops
Efficient Ops
Jan 17, 2022 · Operations

How to Recover Accidentally Deleted Files on Linux Using lsof and extundelete

This guide explains why careful file deletion matters, introduces Linux tools like lsof and extundelete for recovering mistakenly removed files, and provides step‑by‑step commands, installation instructions, and precautions to maximize recovery success while avoiding data loss.

Data RecoveryFile RecoveryLinux
0 likes · 8 min read
How to Recover Accidentally Deleted Files on Linux Using lsof and extundelete
Open Source Linux
Open Source Linux
Jan 17, 2022 · Information Security

Understanding Firewalls: Concepts, Types, and Linux iptables Explained

This article introduces firewall fundamentals, traces their evolution, compares network, application, and database firewalls, explores Linux firewall implementations with iptables and Netfilter, and discusses performance metrics, limitations, and practical use cases for securing enterprise networks.

Information SecurityLinuxiptables
0 likes · 10 min read
Understanding Firewalls: Concepts, Types, and Linux iptables Explained
ITPUB
ITPUB
Jan 14, 2022 · Fundamentals

Master Linux Routing: From Packets to Containers and Overlay Networks

This article explains why Linux routing is essential for container networking, details how routing works during packet transmission and reception, explores routing tables and lookup mechanisms in the kernel, and provides practical commands for enabling forwarding, inspecting, modifying, and testing routing rules.

ContainersLinuxOverlay
0 likes · 16 min read
Master Linux Routing: From Packets to Containers and Overlay Networks
Qunar Tech Salon
Qunar Tech Salon
Jan 13, 2022 · Databases

Root Cause Analysis of MySQL Memory Spike Caused by Excessive dentry Allocation from Mis‑configured yum makecache Cron

The article details a MySQL memory‑usage incident at Qunar where abnormal slab memory, especially dentry allocation, caused a rapid increase in used memory after a mis‑configured yum makecache cron job, and explains the investigation steps, Linux memory concepts, diagnostic commands, and the corrective actions taken.

DentryLinuxMemory Management
0 likes · 14 min read
Root Cause Analysis of MySQL Memory Spike Caused by Excessive dentry Allocation from Mis‑configured yum makecache Cron
Open Source Linux
Open Source Linux
Jan 12, 2022 · Operations

Mastering su and sudo: When and How to Switch Users Securely on Linux

This guide explains the differences between su and sudo, demonstrates how to create test users, switch between accounts using login and non‑login shells, configure sudo privileges via /etc/sudoers, and provides practical command examples for secure user management on Linux.

LinuxSudoSystem Administration
0 likes · 14 min read
Mastering su and sudo: When and How to Switch Users Securely on Linux
Efficient Ops
Efficient Ops
Jan 10, 2022 · Fundamentals

Why Does Disk Space Vanish? Uncovering Linux’s VFS and File Deletion Mysteries

Even when the `df` command shows a full disk, hidden deleted files held open by processes can consume space, and understanding this requires diving into Linux’s virtual file system architecture, including superblocks, inodes, file and dentry objects, as well as link types and file‑process interactions.

Linuxdisk spacefile system
0 likes · 12 min read
Why Does Disk Space Vanish? Uncovering Linux’s VFS and File Deletion Mysteries
Liangxu Linux
Liangxu Linux
Jan 10, 2022 · Operations

Why the ss Command Beats netstat for Fast Socket Monitoring

The article explains how the Linux ss command provides a faster, more detailed view of TCP/UDP sockets than netstat, lists its key features, demonstrates practical examples for filtering by state, address, and port, and shows how to use various ss options for effective network diagnostics.

Command LineLinuxNetwork Monitoring
0 likes · 8 min read
Why the ss Command Beats netstat for Fast Socket Monitoring
dbaplus Community
dbaplus Community
Jan 10, 2022 · Operations

Why Is Linux Load High? Decoding Load Average, CPU Usage & Process States

This article explains Linux process states, how the kernel calculates load average, the relationship between load and CPU utilization, and provides a systematic approach with tools and commands to identify resource bottlenecks, differentiate high‑load/high‑CPU scenarios from high‑load/low‑CPU cases, and pinpoint problematic processes and threads.

LinuxLoad AverageProcess States
0 likes · 11 min read
Why Is Linux Load High? Decoding Load Average, CPU Usage & Process States
Open Source Linux
Open Source Linux
Jan 10, 2022 · Operations

Where Does Linux Store Its System Logs? A Complete /var/log Guide

This article enumerates the most common Linux system log files under /var/log, explains the purpose of each log—including messages, dmesg, auth, boot, daemon, and service-specific logs—and lists key subdirectories for web, mail, audit, and other services.

LinuxLog FilesOperations
0 likes · 5 min read
Where Does Linux Store Its System Logs? A Complete /var/log Guide
Liangxu Linux
Liangxu Linux
Jan 9, 2022 · Operations

How to Keep Linux Processes Running After SSH Disconnects

This guide explains why SSH sessions terminate running programs due to SIGINT and SIGHUP, and demonstrates practical techniques—including using '&', nohup, job control commands, and GNU Screen—to run Linux processes reliably in the background even when the connection drops.

LinuxSSHbackground processes
0 likes · 8 min read
How to Keep Linux Processes Running After SSH Disconnects
Open Source Linux
Open Source Linux
Jan 9, 2022 · Fundamentals

Why Linux File System Differs from Windows: Key Differences Explained

This article introduces beginners to the fundamental differences between Linux and Windows file systems, covering directory structures, case sensitivity, path separators, the absence of drive letters, the "everything is a file" concept, and how file handling differs across the two operating systems.

Case SensitivityDirectory StructureLinux
0 likes · 6 min read
Why Linux File System Differs from Windows: Key Differences Explained
IT Xianyu
IT Xianyu
Jan 6, 2022 · Backend Development

Spring Boot Packaging with Maven Assembly Plugin and Shell Deployment Script

This article explains how to use Maven profiles and the maven‑assembly‑plugin to create environment‑specific zip packages for a Spring Boot application and provides a reusable shell script (shenniu_publish.sh) for extracting, starting, stopping, and managing the deployed JAR on Linux.

Linuxdeploymentshell script
0 likes · 14 min read
Spring Boot Packaging with Maven Assembly Plugin and Shell Deployment Script
Liangxu Linux
Liangxu Linux
Jan 5, 2022 · Backend Development

How to Set Up Multiple Nginx Virtual Hosts on a Single Server

This guide explains what virtual hosts are, how they work in Nginx, and provides step‑by‑step commands to create directory structures, test pages, server block configuration files, enable and disable sites, and verify the setup on a Linux server.

LinuxNGINXVirtual Host
0 likes · 10 min read
How to Set Up Multiple Nginx Virtual Hosts on a Single Server
Architecture Digest
Architecture Digest
Jan 5, 2022 · Fundamentals

Traditional System Call I/O, Read/Write Operations, and High‑Performance Optimizations in Linux

This article explains how Linux implements traditional system‑call I/O using read() and write(), details the data‑copy and context‑switch overhead of read and write operations, describes network and disk I/O, and introduces high‑performance techniques such as zero‑copy, multiplexing, and page‑cache optimizations.

I/OLinuxOperating Systems
0 likes · 12 min read
Traditional System Call I/O, Read/Write Operations, and High‑Performance Optimizations in Linux
Java High-Performance Architecture
Java High-Performance Architecture
Dec 30, 2021 · Information Security

How to Deploy and Manage JumpServer for Secure Remote Access

This guide walks you through installing JumpServer—a bastion host solution that adds permission control, session monitoring, and audit logging to remote server access—by setting up MariaDB and Redis, configuring Docker, generating secret keys, running the JumpServer container, and configuring users, groups, assets, and permissions.

Bastion HostDevOpsJumpServer
0 likes · 16 min read
How to Deploy and Manage JumpServer for Secure Remote Access
Efficient Ops
Efficient Ops
Dec 30, 2021 · Operations

How to Recover Accidentally Deleted Linux Files with lsof and extundelete

This guide explains why careless file deletion can cause serious loss, introduces Linux tools like lsof and extundelete for recovering deleted files, and provides step‑by‑step commands for installing, locating open file descriptors, and restoring individual or all deleted data safely.

File RecoveryLinuxextundelete
0 likes · 8 min read
How to Recover Accidentally Deleted Linux Files with lsof and extundelete
ITPUB
ITPUB
Dec 30, 2021 · Fundamentals

Master Linux Users, Groups, and File Permissions: A Complete Guide

This article explains Linux's multi‑user concepts, detailing owners, groups, and others, walks through interpreting the ls‑al output, clarifies permission bits and i‑node links, and provides practical commands (chgrp, chown, chmod) for securely managing file and directory permissions.

File PermissionsLinuxUsers and Groups
0 likes · 15 min read
Master Linux Users, Groups, and File Permissions: A Complete Guide