Understanding the Linux Directory Structure
This article lists the main top‑level directories in a typical Linux filesystem—such as bin, sbin, etc, usr, home, root, dev, lib, mnt, boot, tmp, and var—and explains the purpose of each directory.
This article lists the main top‑level directories in a typical Linux filesystem—such as bin, sbin, etc, usr, home, root, dev, lib, mnt, boot, tmp, and var—and explains the purpose of each directory.
This guide outlines practical techniques to improve Linux host security, covering BIOS password setup, disk encryption, boot directory protection, USB disabling, system updates, package cleanup, port scanning, SSH hardening, SELinux activation, network parameter tuning, password policies, and file permission hardening.
This article explains Linux command syntax, where program files are stored, how to obtain help for both internal and external commands, and outlines the structure and purpose of man page sections, providing a solid foundation for system administration tasks.
Learn step‑by‑step how to install, configure, and use Samba on a Linux server to create shared folders accessible from Windows, covering package installation, service startup, user creation, configuration file editing, permission settings, and GUI tools, with practical command examples and screenshots.
This guide walks through KVM’s background, features, architecture, and step‑by‑step deployment—including hardware checks, module loading, qemu‑kvm options, bridge configuration, script creation, VM installation, and Libvirt‑based management with virt‑install and virt‑manager—providing a comprehensive tutorial for Linux virtualization.
This guide explains the RPM package naming rules, essential rpm commands for installing, erasing, querying, verifying, and upgrading packages, as well as YUM configuration, repository definition, and common YUM commands for managing software on Red Hat‑based Linux systems.
This guide walks through Linux system startup fundamentals, covering nohup usage, nice value adjustments, runlevel inspection, initramfs handling, detailed boot sequence steps, chkconfig and GRUB configuration, and hands‑on exercises for creating services and building a custom Linux system.
This article lists nine hazardous Linux commands—including a fork bomb, misuse of /dev/null, reckless rm -rf options, dangerous mkfs usage, tar bombs, dd mishaps, malicious scripts, and deceptive source code—explaining how each can destroy data or crash a system and how to avoid them.
This guide walks through configuring the firewall, installing Kibana, Logstash, and Elasticsearch, setting up SSL certificates, forwarding ports, deploying Filebeat to client servers, and verifying the ELK stack operation on Linux, complete with command examples and screenshots.
Learn the essential concepts of Linux user and group management, including user types, the structure of /etc/passwd and /etc/shadow, group definitions, permission inheritance, and practical commands such as useradd, usermod, groupadd, and userdel for creating, modifying, and deleting accounts.
This tutorial walks you through the complete Linux installation process, covering BIOS configuration, booting from the installation CD, language and keyboard selection, disk partitioning, timezone and root account setup, package customization, and final system reboot, all illustrated with screenshots.
This tutorial walks through the practical steps to protect an SSH daemon from brute‑force attacks by enforcing strong passwords, changing the default port, disabling root logins, and configuring Fail2Ban to automatically ban malicious IPs, complete with command‑line examples and configuration details.
This article lists nine hazardous Linux commands and code snippets—such as a fork bomb, unsafe mv to /dev/null, reckless rm -rf usage, disk‑formatting mkfs, tar bombs, dd misuse, malicious scripts, tainted source code, and decompression bombs—explaining their effects and how to avoid them.
This article walks through a systematic, multi‑stage approach to identifying, reproducing, and fixing server‑side problems using Linux tools such as strace, lsof, and netstat, illustrated with real‑world case studies and practical command examples.
This article presents a curated list of 18 lesser‑known command‑line utilities for Linux/Unix administrators, explaining their purpose, typical usage scenarios, and how they help monitor system resources, network activity, and security events.
This article explains Linux swap fundamentals, the role of swappiness, kswapd behavior, memory watermarks, and related kernel parameters, providing practical guidance on configuring swap priority, zone reclaim, and other settings to optimize system performance under various workloads.
This article presents a curated list of twelve powerful command-line utilities—such as lsof, htop, iotop, IPTraf, Monit, netHogs, iftop, and Monitorix—that Linux system administrators can use to monitor, diagnose, and optimize system and network performance.
This comprehensive guide covers essential Linux command‑line techniques—from basic Bash navigation and file management to advanced text processing, system debugging, one‑liner tricks, and Mac‑specific tips—providing both beginners and experienced users with practical examples and shortcuts to boost productivity.
This article presents 20 common Linux interview questions covering runlevels, default gateways, initramfs creation, cpio, patch, aspell, SPF lookup, package identification, bond0 status, /proc filesystem, file searches, strings, tee, environment variables, awk, at, and lspci, each with concise command‑line solutions.
This guide explains three practical methods—using df, mount -l, and reading /etc/mtab—to list Linux mount points together with their associated disks or logical volumes, highlighting each command's output format and limitations.
This guide walks through inspecting a large RAID5 disk on CentOS 6.7, using Parted to create a new /archive partition, configuring ext4 features, compiling e2fsprogs, formatting the partition, mounting it, and verifying disk usage and filesystem details.
This article explains why the infamous rm -rf / command is blocked by modern POSIX‑compliant coreutils, shows the exact error messages, details version requirements, and demonstrates how the dangerous --no-preserve-root option can override the safety guard.
A collection of real‑world programming mishaps—from mixing test and production data to dangerous rm commands—illustrates why strict environment separation, cautious command execution, and disciplined code management are essential for reliable software operations.
This article presents a comprehensive set of Linux server performance tuning techniques, covering kernel I/O scheduling, daemon management, GUI disabling, module cleanup, control panel removal, network and storage optimizations, filesystem choices, kernel parameter tweaks, and essential monitoring commands to improve efficiency and reliability.
This guide explains step‑by‑step how to use LVM logical volumes to build a reusable VM template, configure it, and generate snapshots that allow rapid provisioning of multiple virtual machines while saving storage space.
A comprehensive overview of common Linux daemon processes, detailing each service’s purpose, typical use cases, and key configuration notes for system administrators seeking to understand and manage background services effectively.
This guide explains both static and dynamic CPU performance indicators, shows how to retrieve static details via /proc/cpuinfo, and demonstrates using Linux commands like top, uptime, and ps to assess load, identify heavy processes, and interpret per‑core usage statistics.
This guide compiles essential Linux commands for inspecting system details, resources, disks, networks, processes, users, services, and installed programs, providing concise descriptions that help administrators quickly gather kernel, hardware, memory, storage, and runtime information.
This article presents practical Linux boot troubleshooting techniques, including using single‑user mode, correcting GRUB configuration errors, and employing rescue mode, illustrated with step‑by‑step case studies for root password recovery, disk sector errors, and dual‑boot restoration.
htop is a modern, interactive process monitor that enhances the classic top utility with features like sortable columns, search filtering, tree view, process killing, and file list inspection, and this guide shows how to install it on CentOS and use its key functions effectively.
This guide introduces the lsof utility, explains its basic usage for listing open files, demonstrates practical scenarios such as identifying files used by specific processes, checking which process occupies a port, and leveraging lsof to recover deleted files, helping administrators troubleshoot I/O and security issues.
This article compiles a comprehensive set of Linux command‑line shortcuts, Bash expressions, daily utilities, data‑processing commands, and system‑debugging tools, providing practical examples and code snippets to help users work faster and manage servers more effectively.
This guide explains what PHP‑FPM is, walks through its installation, dissects the install script, covers common parameters and advanced commands, and then teaches how to inspect, verify, test, and build RPM packages on Linux systems.
Learn how to diagnose and alleviate heavy I/O load on Linux systems by using three essential commands—iostat for CPU and disk statistics, iotop for real‑time I/O process ranking, and lsof for listing open files—complete with key options and output interpretation.
This guide explains the essential RHCS components—including CMAN, DLM, CCS, and FENCE—details how to start and stop the cluster, manage application services with clusvcadm, monitor cluster status using cman_tool, clustat, and ccs_tool, and maintain GFS2 file systems with dedicated utilities.
This article presents a comprehensive collection of useful Linux command-line utilities—including dstat, screen, tmux, multitail, rsync, and many others—explaining their purposes, typical use cases, and where to obtain them, helping system administrators and developers improve productivity and monitoring.
This comprehensive syllabus outlines a 15‑phase curriculum covering Linux fundamentals, shell scripting, network services, security, databases, clustering, virtualization, cloud platforms, automation tools, system tuning, big‑data processing, and professional development for IT practitioners.
This article explains the design principles, working mechanisms, installation steps, and common issues of syslog-ng and daemontools, showing how to configure syslog-ng for fine‑grained filtering, run it under daemontools supervision, and resolve a daemon restart loop.
This article explains the evolution of Linux init systems, focusing on Upstart's event‑driven design, core concepts such as jobs and events, configuration syntax, and practical commands for developers and administrators, highlighting its advantages over traditional SysVinit.
This article introduces the evolution of Linux init systems—from the classic SysVinit to Upstart and systemd—explaining their history, runlevel concepts, startup sequences, management tools, and the reasons behind the shift toward faster, more modern init solutions.
This guide walks you through booting into rescue mode, checking the root filesystem, deleting and recreating the root partition with fdisk, and resizing the filesystem with resize2fs to reclaim hundreds of megabytes without reinstalling Linux.
This article explains how to use the Linux tail command to monitor log files in real time, filter errors, and reliably continue following logs after rotation by using the -F option, providing practical guidance for system administrators and developers.
This guide walks you through Linux's task‑scheduling tools—at, batch, crontab, and anacron—covering one‑time and periodic job setup, command syntax, permission files, and practical examples to automate system administration tasks.
This guide explains how to install htop on CentOS, describes its interface layout, details the functionality of each F‑key shortcut, and covers useful command‑line options for customizing the real‑time process monitoring experience.
Learn step‑by‑step how to configure passwordless SSH from a user on one Linux host to another by generating RSA keys, copying the public key, creating the necessary .ssh directory, and troubleshooting common permission issues.
This guide explains how to use Linux's local mail service and the at, batch, and cron commands to create, list, modify, and delete one‑time and recurring scheduled tasks, including command syntax, examples, and troubleshooting tips.
This guide explains how to use logrotate on Linux to automatically rotate, compress, and delete log files, covering installation, configuration examples for size‑based and time‑based rotation, and essential options to keep server storage under control.
Learn how to replace traditional backup methods with rsync and inotify for fast, secure, incremental file synchronization, covering rsync fundamentals, command options, server and client configuration, inotify monitoring scripts, and testing procedures to achieve real‑time data replication between Linux servers.
This article explains what RAID is, compares common RAID levels with their advantages and disadvantages, and provides step‑by‑step Linux commands for creating, managing, and safely shutting down software RAID arrays using mdadm.
When managing Linux servers, the df and du commands often show mismatched disk usage figures, and this article explains the three main causes—reserved space, phantom files, and uncounted data—along with how to identify and resolve each discrepancy.
This guide explains what the slay command‑line tool does, how to install it on major Linux distributions, and provides step‑by‑step usage examples for terminating every process belonging to a chosen user with administrative privileges.
This guide walks you through installing Monit on Ubuntu and CentOS, handling common build issues, configuring the web UI, setting up email alerts, and creating practical monitoring rules for processes, filesystems, files, custom scripts, and remote hosts.
This article explains the concept, architecture, and trade‑offs of various RAID levels—including RAID 0, 1, 2, 3, 4, 5, 6, and hybrid configurations—detailing how they combine multiple inexpensive disks to achieve different balances of speed, capacity, and fault tolerance for server environments.
This guide walks you through downloading, installing, configuring, and testing Fail2Ban on a Linux system, covering essential parameters, SSH jail setup, custom actions, filter editing, and command‑line utilities for managing bans and logs.
This guide reviews eleven Linux tools and commands—including iptraf, sar, ntop, and tcpdump—for monitoring network traffic, explains installation steps for various distributions, and describes how to interpret their output, helping administrators keep web servers performant and secure.
This article explains why high CPU usage on Linux servers isn’t always a problem, describes how to identify true CPU bottlenecks using tools like uptime, top, sar and vmstat, and offers practical tuning steps such as stopping unnecessary processes, adjusting priorities, using CPU affinity, and updating drivers.
This article explains Linux's real‑time and general scheduling policies—including SCHED_RR, SCHED_FIFO, SCHED_NORMAL, SCHED_BATCH, and SCHED_IDLE—describes their behavior, and demonstrates their impact on CPU allocation through practical chrt command tests.
This article compiles a curated list of essential Linux operations books, ranging from beginner-friendly introductions and system‑administration handbooks to advanced texts on operating‑system theory, kernel design, networking, and hands‑on system building, offering a comprehensive learning roadmap for aspiring Linux engineers.
This guide presents a comprehensive set of Linux commands and practical steps for detecting, analyzing, and responding to compromised systems, covering process identification, file inspection, network checks, log recovery, forensic imaging, and useful tools such as ldd, strace, and nc.
The author recounts how a university encounter and later work demands led them to master Unix, using tools like awk, Perl, Python and Ruby to automate massive data tasks, teach courses, and champion Ubuntu and other Unix-like systems as essential, productivity‑driving platforms.
This article explains what zombie processes are in Unix/Linux, shows how to list and count them using ps and top, provides commands to terminate them by killing their parent or sending signals, and offers strategies such as ignoring SIGCHLD or double‑forking to prevent their creation.
Drawing from a year and a half of Linux operations experience, this guide outlines practical standards for online actions, data handling, security, monitoring, performance tuning, and the right mindset to prevent costly incidents and maintain stable, secure systems.
This guide lists 25 practical Linux hardening techniques—from BIOS protection and partitioning to SSH configuration, SELinux, firewall rules, password policies, and log management—helping system administrators strengthen server security against attacks and vulnerabilities.
This article explains the fundamental concepts of Linux terminal devices—including tty, pseudo‑terminal (pty), and virtual terminal (pts)—and details the various /dev entries such as serial ports, controlling terminals, console terminals, and their practical usage examples.
This article outlines the origins, release cycle, commercial licensing, feature set, and derivative distributions of Red Hat Enterprise Linux, focusing on version 7’s hardware support, kernel enhancements, storage, networking, virtualization, container integration, toolchain, and system management capabilities.
The article details the official CentOS 7.0.1406 64‑bit release announced on July 7, 2014, highlighting kernel upgrades, container support, default JDK, installation media options, verification steps, major changes, downgrade options, known issues, and where to obtain source code and ISO images.
This guide introduces Linux Logical Volume Manager (LVM), explains its core concepts such as physical volumes, volume groups, and logical volumes, and provides step‑by‑step procedures for checking versions, handling common failures, and performing disaster‑recovery operations on both server and desktop systems.
This tutorial explains what the umask setting does, shows the octal permission masks, and provides step‑by‑step instructions for permanently modifying the default umask in a user’s shell profile or /etc/profile on any Linux distribution.
The article presents a curated Chinese‑language reading list for application operations and system administration, dividing essential titles into technical culture, core technical, and peripheral works, and recommending classics such as The Pragmatic Programmer, Unix Super Tools, Continuous Delivery, Mastering Regular Expressions, Ruby Metaprogramming, and even interdisciplinary books like The Zen of Presentation and Approaching Chinese Medicine.