Tagged articles
769 articles
Page 8 of 8
ZhiKe AI
ZhiKe AI
Feb 8, 2017 · Fundamentals

Understanding the Linux Directory Structure

This article lists the main top‑level directories in a typical Linux filesystem—such as bin, sbin, etc, usr, home, root, dev, lib, mnt, boot, tmp, and var—and explains the purpose of each directory.

Directory StructureFilesystemLinux
0 likes · 2 min read
Understanding the Linux Directory Structure
ITPUB
ITPUB
Jan 30, 2017 · Information Security

How to Harden a Linux Host: BIOS Protection, Disk Encryption, SSH Hardening and More

This guide outlines practical techniques to improve Linux host security, covering BIOS password setup, disk encryption, boot directory protection, USB disabling, system updates, package cleanup, port scanning, SSH hardening, SELinux activation, network parameter tuning, password policies, and file permission hardening.

HardeningSELinuxSSH
0 likes · 14 min read
How to Harden a Linux Host: BIOS Protection, Disk Encryption, SSH Hardening and More
MaGe Linux Operations
MaGe Linux Operations
Jan 13, 2017 · Fundamentals

Master Linux Command Basics: Usage, Locations, and Help Retrieval

This article explains Linux command syntax, where program files are stored, how to obtain help for both internal and external commands, and outlines the structure and purpose of man page sections, providing a solid foundation for system administration tasks.

LinuxSystem Administrationcommand-line
0 likes · 3 min read
Master Linux Command Basics: Usage, Locations, and Help Retrieval
MaGe Linux Operations
MaGe Linux Operations
Dec 12, 2016 · Operations

How to Set Up Samba for Seamless Windows‑Linux File Sharing on CentOS

Learn step‑by‑step how to install, configure, and use Samba on a Linux server to create shared folders accessible from Windows, covering package installation, service startup, user creation, configuration file editing, permission settings, and GUI tools, with practical command examples and screenshots.

CentOSLinuxSamba
0 likes · 5 min read
How to Set Up Samba for Seamless Windows‑Linux File Sharing on CentOS
MaGe Linux Operations
MaGe Linux Operations
Nov 24, 2016 · Cloud Computing

Master KVM: Deploy and Manage Virtual Machines on Linux with Libvirt

This guide walks through KVM’s background, features, architecture, and step‑by‑step deployment—including hardware checks, module loading, qemu‑kvm options, bridge configuration, script creation, VM installation, and Libvirt‑based management with virt‑install and virt‑manager—providing a comprehensive tutorial for Linux virtualization.

KVMLinuxQEMU
0 likes · 15 min read
Master KVM: Deploy and Manage Virtual Machines on Linux with Libvirt
MaGe Linux Operations
MaGe Linux Operations
Oct 28, 2016 · Operations

Master Linux Boot Process: From BIOS to Init with Practical Commands

This guide walks through Linux system startup fundamentals, covering nohup usage, nice value adjustments, runlevel inspection, initramfs handling, detailed boot sequence steps, chkconfig and GRUB configuration, and hands‑on exercises for creating services and building a custom Linux system.

Boot ProcessCustom LinuxGRUB
0 likes · 18 min read
Master Linux Boot Process: From BIOS to Init with Practical Commands
MaGe Linux Operations
MaGe Linux Operations
Oct 8, 2016 · Information Security

Beware These 9 Dangerous Linux Commands That Can Wipe Your System

This article lists nine hazardous Linux commands—including a fork bomb, misuse of /dev/null, reckless rm -rf options, dangerous mkfs usage, tar bombs, dd mishaps, malicious scripts, and deceptive source code—explaining how each can destroy data or crash a system and how to avoid them.

LinuxSecurityShell Commands
0 likes · 7 min read
Beware These 9 Dangerous Linux Commands That Can Wipe Your System
MaGe Linux Operations
MaGe Linux Operations
Jul 18, 2016 · Operations

Step-by-Step Guide to Installing Linux: From BIOS to Full System Setup

This tutorial walks you through the complete Linux installation process, covering BIOS configuration, booting from the installation CD, language and keyboard selection, disk partitioning, timezone and root account setup, package customization, and final system reboot, all illustrated with screenshots.

LinuxOperating SystemSystem Administration
0 likes · 6 min read
Step-by-Step Guide to Installing Linux: From BIOS to Full System Setup
ITPUB
ITPUB
Jul 9, 2016 · Information Security

How to Harden SSHD Against Brute‑Force Attacks with Fail2Ban

This tutorial walks through the practical steps to protect an SSH daemon from brute‑force attacks by enforcing strong passwords, changing the default port, disabling root logins, and configuring Fail2Ban to automatically ban malicious IPs, complete with command‑line examples and configuration details.

Brute-force protectionFail2banLinux security
0 likes · 12 min read
How to Harden SSHD Against Brute‑Force Attacks with Fail2Ban
ITPUB
ITPUB
Jul 2, 2016 · Information Security

9 Dangerous Linux Commands You Must Avoid

This article lists nine hazardous Linux commands and code snippets—such as a fork bomb, unsafe mv to /dev/null, reckless rm -rf usage, disk‑formatting mkfs, tar bombs, dd misuse, malicious scripts, tainted source code, and decompression bombs—explaining their effects and how to avoid them.

LinuxSystem Administrationcommand-line
0 likes · 7 min read
9 Dangerous Linux Commands You Must Avoid
Qunar Tech Salon
Qunar Tech Salon
Jun 12, 2016 · Operations

18 Command‑Line Tools to Monitor Linux Performance

This article presents a curated list of 18 lesser‑known command‑line utilities for Linux/Unix administrators, explaining their purpose, typical usage scenarios, and how they help monitor system resources, network activity, and security events.

LinuxOperationsPerformance Monitoring
0 likes · 11 min read
18 Command‑Line Tools to Monitor Linux Performance
Efficient Ops
Efficient Ops
Jun 5, 2016 · Operations

Mastering Linux Swap: How Swappiness, kswapd, and Watermarks Control Memory

This article explains Linux swap fundamentals, the role of swappiness, kswapd behavior, memory watermarks, and related kernel parameters, providing practical guidance on configuring swap priority, zone reclaim, and other settings to optimize system performance under various workloads.

LinuxMemory ManagementSwap
0 likes · 20 min read
Mastering Linux Swap: How Swappiness, kswapd, and Watermarks Control Memory
Efficient Ops
Efficient Ops
May 26, 2016 · Operations

12 Essential Linux Command-Line Tools for Performance Monitoring

This article presents a curated list of twelve powerful command-line utilities—such as lsof, htop, iotop, IPTraf, Monit, netHogs, iftop, and Monitorix—that Linux system administrators can use to monitor, diagnose, and optimize system and network performance.

LinuxOperationsPerformance Monitoring
0 likes · 9 min read
12 Essential Linux Command-Line Tools for Performance Monitoring
MaGe Linux Operations
MaGe Linux Operations
May 23, 2016 · Operations

Master the Linux Command Line: Essential Tips and Tricks for Engineers

This comprehensive guide covers essential Linux command‑line techniques—from basic Bash navigation and file management to advanced text processing, system debugging, one‑liner tricks, and Mac‑specific tips—providing both beginners and experienced users with practical examples and shortcuts to boost productivity.

BashLinuxShell scripting
0 likes · 29 min read
Master the Linux Command Line: Essential Tips and Tricks for Engineers
MaGe Linux Operations
MaGe Linux Operations
May 14, 2016 · Operations

Master Linux Interview Questions: 20 Essential Commands & Answers

This article presents 20 common Linux interview questions covering runlevels, default gateways, initramfs creation, cpio, patch, aspell, SPF lookup, package identification, bond0 status, /proc filesystem, file searches, strings, tee, environment variables, awk, at, and lspci, each with concise command‑line solutions.

Interview PreparationLinuxShell
0 likes · 10 min read
Master Linux Interview Questions: 20 Essential Commands & Answers
ITPUB
ITPUB
May 10, 2016 · Operations

How to View Disk Mount Points and Underlying Volumes on Linux

This guide explains three practical methods—using df, mount -l, and reading /etc/mtab—to list Linux mount points together with their associated disks or logical volumes, highlighting each command's output format and limitations.

LinuxMountSystem Administration
0 likes · 5 min read
How to View Disk Mount Points and Underlying Volumes on Linux
ITPUB
ITPUB
Apr 19, 2016 · Operations

What the Worst WTF Moments Reveal About Software Operations

A collection of real‑world programming mishaps—from mixing test and production data to dangerous rm commands—illustrates why strict environment separation, cautious command execution, and disciplined code management are essential for reliable software operations.

DevOpsOperationsSystem Administration
0 likes · 10 min read
What the Worst WTF Moments Reveal About Software Operations
Architecture Digest
Architecture Digest
Apr 19, 2016 · Operations

Linux Server Performance Optimization Tips

This article presents a comprehensive set of Linux server performance tuning techniques, covering kernel I/O scheduling, daemon management, GUI disabling, module cleanup, control panel removal, network and storage optimizations, filesystem choices, kernel parameter tweaks, and essential monitoring commands to improve efficiency and reliability.

LinuxServerSystem Administration
0 likes · 13 min read
Linux Server Performance Optimization Tips
Qunar Tech Salon
Qunar Tech Salon
Apr 19, 2016 · Operations

How to Create Virtual Machine Snapshots Using LVM

This guide explains step‑by‑step how to use LVM logical volumes to build a reusable VM template, configure it, and generate snapshots that allow rapid provisioning of multiple virtual machines while saving storage space.

LVMLinuxSystem Administration
0 likes · 4 min read
How to Create Virtual Machine Snapshots Using LVM
ITPUB
ITPUB
Apr 12, 2016 · Operations

Essential Linux Daemons: Functions and Use Cases Explained

A comprehensive overview of common Linux daemon processes, detailing each service’s purpose, typical use cases, and key configuration notes for system administrators seeking to understand and manage background services effectively.

LinuxOperationsSystem Administration
0 likes · 12 min read
Essential Linux Daemons: Functions and Use Cases Explained
Big Data and Microservices
Big Data and Microservices
Mar 19, 2016 · Operations

Essential Linux Commands for Comprehensive System Inspection

This guide compiles essential Linux commands for inspecting system details, resources, disks, networks, processes, users, services, and installed programs, providing concise descriptions that help administrators quickly gather kernel, hardware, memory, storage, and runtime information.

LinuxShellSystem Administration
0 likes · 6 min read
Essential Linux Commands for Comprehensive System Inspection
Java High-Performance Architecture
Java High-Performance Architecture
Feb 3, 2016 · Operations

Master htop: Powerful Process Monitoring Tips & Tricks

htop is a modern, interactive process monitor that enhances the classic top utility with features like sortable columns, search filtering, tree view, process killing, and file list inspection, and this guide shows how to install it on CentOS and use its key functions effectively.

CentOSLinuxSystem Administration
0 likes · 3 min read
Master htop: Powerful Process Monitoring Tips & Tricks
Java High-Performance Architecture
Java High-Performance Architecture
Jan 21, 2016 · Operations

Master lsof: Inspect Open Files, Find Processes, and Recover Deleted Data

This guide introduces the lsof utility, explains its basic usage for listing open files, demonstrates practical scenarios such as identifying files used by specific processes, checking which process occupies a port, and leveraging lsof to recover deleted files, helping administrators troubleshoot I/O and security issues.

File RecoveryLinuxSystem Administration
0 likes · 4 min read
Master lsof: Inspect Open Files, Find Processes, and Recover Deleted Data
Qunar Tech Salon
Qunar Tech Salon
Jan 21, 2016 · Operations

Essential Linux Command‑Line Tips and Tricks for Efficient System Use

This article compiles a comprehensive set of Linux command‑line shortcuts, Bash expressions, daily utilities, data‑processing commands, and system‑debugging tools, providing practical examples and code snippets to help users work faster and manage servers more effectively.

LinuxShell scriptingSystem Administration
0 likes · 12 min read
Essential Linux Command‑Line Tips and Tricks for Efficient System Use
MaGe Linux Operations
MaGe Linux Operations
Jan 8, 2016 · Operations

Mastering PHP‑FPM and RPM Packaging: A Complete Guide

This guide explains what PHP‑FPM is, walks through its installation, dissects the install script, covers common parameters and advanced commands, and then teaches how to inspect, verify, test, and build RPM packages on Linux systems.

LinuxRPMSystem Administration
0 likes · 4 min read
Mastering PHP‑FPM and RPM Packaging: A Complete Guide
ITPUB
ITPUB
Nov 10, 2015 · Operations

Mastering RHCS: Key Components and Practical Commands for Cluster Management

This guide explains the essential RHCS components—including CMAN, DLM, CCS, and FENCE—details how to start and stop the cluster, manage application services with clusvcadm, monitor cluster status using cman_tool, clustat, and ccs_tool, and maintain GFS2 file systems with dedicated utilities.

Cluster ManagementGFS2Linux
0 likes · 14 min read
Mastering RHCS: Key Components and Practical Commands for Cluster Management

A Curated List of Essential Linux Command-Line Tools

This article presents a comprehensive collection of useful Linux command-line utilities—including dstat, screen, tmux, multitail, rsync, and many others—explaining their purposes, typical use cases, and where to obtain them, helping system administrators and developers improve productivity and monitoring.

BackupLinuxSystem Administration
0 likes · 12 min read
A Curated List of Essential Linux Command-Line Tools
Qunar Tech Salon
Qunar Tech Salon
Jun 7, 2015 · Operations

Understanding Upstart: Features, Concepts, and Usage in Linux Init Systems

This article explains the evolution of Linux init systems, focusing on Upstart's event‑driven design, core concepts such as jobs and events, configuration syntax, and practical commands for developers and administrators, highlighting its advantages over traditional SysVinit.

Event-drivenLinux initService Management
0 likes · 24 min read
Understanding Upstart: Features, Concepts, and Usage in Linux Init Systems
Qunar Tech Salon
Qunar Tech Salon
May 23, 2015 · Operations

How to Follow Log Files and Handle Log Rotation with tail

This article explains how to use the Linux tail command to monitor log files in real time, filter errors, and reliably continue following logs after rotation by using the -F option, providing practical guidance for system administrators and developers.

LinuxLog MonitoringSystem Administration
0 likes · 2 min read
How to Follow Log Files and Handle Log Rotation with tail
MaGe Linux Operations
MaGe Linux Operations
May 18, 2015 · Information Security

How to Set Up Password‑Free SSH Login Between Two Linux Hosts

Learn step‑by‑step how to configure passwordless SSH from a user on one Linux host to another by generating RSA keys, copying the public key, creating the necessary .ssh directory, and troubleshooting common permission issues.

Public Key AuthenticationSSHSystem Administration
0 likes · 3 min read
How to Set Up Password‑Free SSH Login Between Two Linux Hosts
MaGe Linux Operations
MaGe Linux Operations
May 5, 2015 · Operations

Master Logrotate: Automate Linux Log Management Efficiently

This guide explains how to use logrotate on Linux to automatically rotate, compress, and delete log files, covering installation, configuration examples for size‑based and time‑based rotation, and essential options to keep server storage under control.

AutomationLog ManagementSystem Administration
0 likes · 6 min read
Master Logrotate: Automate Linux Log Management Efficiently
MaGe Linux Operations
MaGe Linux Operations
Apr 29, 2015 · Operations

Achieve Real-Time File Sync with rsync + inotify: Step-by-Step Guide

Learn how to replace traditional backup methods with rsync and inotify for fast, secure, incremental file synchronization, covering rsync fundamentals, command options, server and client configuration, inotify monitoring scripts, and testing procedures to achieve real‑time data replication between Linux servers.

BackupSystem Administrationinotify
0 likes · 9 min read
Achieve Real-Time File Sync with rsync + inotify: Step-by-Step Guide
MaGe Linux Operations
MaGe Linux Operations
Apr 24, 2015 · Fundamentals

Mastering RAID: Levels, Benefits, and Linux Setup Guide

This article explains what RAID is, compares common RAID levels with their advantages and disadvantages, and provides step‑by‑step Linux commands for creating, managing, and safely shutting down software RAID arrays using mdadm.

LinuxRAIDSystem Administration
0 likes · 5 min read
Mastering RAID: Levels, Benefits, and Linux Setup Guide
MaGe Linux Operations
MaGe Linux Operations
Nov 3, 2014 · Operations

How to Detect and Fix CPU Bottlenecks on Linux Servers

This article explains why high CPU usage on Linux servers isn’t always a problem, describes how to identify true CPU bottlenecks using tools like uptime, top, sar and vmstat, and offers practical tuning steps such as stopping unnecessary processes, adjusting priorities, using CPU affinity, and updating drivers.

CPU BottleneckLinuxPerformance Monitoring
0 likes · 5 min read
How to Detect and Fix CPU Bottlenecks on Linux Servers
MaGe Linux Operations
MaGe Linux Operations
Aug 27, 2014 · Operations

Must‑Read Linux Ops Books: From Basics to Kernel Mastery

This article compiles a curated list of essential Linux operations books, ranging from beginner-friendly introductions and system‑administration handbooks to advanced texts on operating‑system theory, kernel design, networking, and hands‑on system building, offering a comprehensive learning roadmap for aspiring Linux engineers.

BooksLinuxSystem Administration
0 likes · 3 min read
Must‑Read Linux Ops Books: From Basics to Kernel Mastery
MaGe Linux Operations
MaGe Linux Operations
Aug 19, 2014 · Information Security

Essential Linux Commands for Incident Response and System Forensics

This guide presents a comprehensive set of Linux commands and practical steps for detecting, analyzing, and responding to compromised systems, covering process identification, file inspection, network checks, log recovery, forensic imaging, and useful tools such as ldd, strace, and nc.

ForensicsLinuxSecurity
0 likes · 13 min read
Essential Linux Commands for Incident Response and System Forensics
Baidu Tech Salon
Baidu Tech Salon
Aug 15, 2014 · Operations

My Journey with Unix: From Motivation to Automation

The author recounts how a university encounter and later work demands led them to master Unix, using tools like awk, Perl, Python and Ruby to automate massive data tasks, teach courses, and champion Ubuntu and other Unix-like systems as essential, productivity‑driving platforms.

AutomationPythonScripting
0 likes · 7 min read
My Journey with Unix: From Motivation to Automation
MaGe Linux Operations
MaGe Linux Operations
Aug 13, 2014 · Operations

How to Detect, Kill, and Prevent Zombie Processes in Linux

This article explains what zombie processes are in Unix/Linux, shows how to list and count them using ps and top, provides commands to terminate them by killing their parent or sending signals, and offers strategies such as ignoring SIGCHLD or double‑forking to prevent their creation.

LinuxSIGCHLDSystem Administration
0 likes · 4 min read
How to Detect, Kill, and Prevent Zombie Processes in Linux
MaGe Linux Operations
MaGe Linux Operations
Aug 4, 2014 · Information Security

25 Essential Linux Hardening Tips to Secure Your Servers

This guide lists 25 practical Linux hardening techniques—from BIOS protection and partitioning to SSH configuration, SELinux, firewall rules, password policies, and log management—helping system administrators strengthen server security against attacks and vulnerabilities.

HardeningLinuxSecurity
0 likes · 15 min read
25 Essential Linux Hardening Tips to Secure Your Servers
MaGe Linux Operations
MaGe Linux Operations
Jul 14, 2014 · Operations

What Makes Red Hat Enterprise Linux 7 a Powerhouse for Modern Ops?

This article outlines the origins, release cycle, commercial licensing, feature set, and derivative distributions of Red Hat Enterprise Linux, focusing on version 7’s hardware support, kernel enhancements, storage, networking, virtualization, container integration, toolchain, and system management capabilities.

Enterprise OSLinuxRHEL
0 likes · 6 min read
What Makes Red Hat Enterprise Linux 7 a Powerhouse for Modern Ops?
MaGe Linux Operations
MaGe Linux Operations
Jul 8, 2014 · Operations

CentOS 7.0.1406 Release: Key Features, Install Media & Known Issues

The article details the official CentOS 7.0.1406 64‑bit release announced on July 7, 2014, highlighting kernel upgrades, container support, default JDK, installation media options, verification steps, major changes, downgrade options, known issues, and where to obtain source code and ISO images.

CentOSInstallationKernel
0 likes · 7 min read
CentOS 7.0.1406 Release: Key Features, Install Media & Known Issues
MaGe Linux Operations
MaGe Linux Operations
Jun 25, 2014 · Operations

Mastering Linux LVM: From Basics to Disaster Recovery Strategies

This guide introduces Linux Logical Volume Manager (LVM), explains its core concepts such as physical volumes, volume groups, and logical volumes, and provides step‑by‑step procedures for checking versions, handling common failures, and performing disaster‑recovery operations on both server and desktop systems.

LVMLinuxStorage Management
0 likes · 29 min read
Mastering Linux LVM: From Basics to Disaster Recovery Strategies
MaGe Linux Operations
MaGe Linux Operations
Jun 23, 2014 · Fundamentals

How to Permanently Change the Umask Value on Linux Systems

This tutorial explains what the umask setting does, shows the octal permission masks, and provides step‑by‑step instructions for permanently modifying the default umask in a user’s shell profile or /etc/profile on any Linux distribution.

File PermissionsLinuxShell
0 likes · 4 min read
How to Permanently Change the Umask Value on Linux Systems
Baidu Tech Salon
Baidu Tech Salon
Apr 24, 2014 · Operations

Recommended Reading List for Application Operations and System Administration

The article presents a curated Chinese‑language reading list for application operations and system administration, dividing essential titles into technical culture, core technical, and peripheral works, and recommending classics such as The Pragmatic Programmer, Unix Super Tools, Continuous Delivery, Mastering Regular Expressions, Ruby Metaprogramming, and even interdisciplinary books like The Zen of Presentation and Approaching Chinese Medicine.

AutomationBook RecommendationsLinux
0 likes · 8 min read
Recommended Reading List for Application Operations and System Administration