Tags: SysAdmin

How Security Flaws Work: SQL Injection

SQL injection attacks exist at the opposite end of the complexity spectrum from buffer overflows, the subject of our last in-depth security analysis. Rather than manipulating the low-level details of how processors call functions, SQL injection attacks are generally used against high-level...
Read 0 Comments

Microservices Ecosystem Transit Map

Microservices architecture has reached a tipping point where its broad adoption is now pretty much guaranteed. According to a survey by NGINX, nearly a third of companies have deployed microservices in production, and another third are either using microservices in development or considering them....
Read 0 Comments

How to Sort Output of ‘ls’ Command By Last Modified Date and Time

One of the commonest things a Linux user will always do on the command line is listing the contents of a directory. As we may already know, ls and dir are the two commands available on Linux for listing directory content, with the former being more popular and in most cases, preferred by users....
Read 0 Comments

Manage SSH Key File With Passphrase

Any serious DevOps will only ssh by key file. Not with password, right? And mostly our powerful key file can unlock many critical envs. Have you ever uploaded your private key to other envs, like jumpbox? What if your key is magically stolen by hackers somehow? Time to protect your sensitive ssh...
Read 0 Comments

How to Check Bad Sectors or Bad Blocks on Hard Disk in Linux

Let us start by defining a bad sector/block, it’s a section on a disk drive or flash memory that can not be read from or written to anymore, as a result of a fixed physical damage on the disk surface or failed flash memory transistors. As bad sectors continue to accumulate, they can undesirably or...
Read 0 Comments

5 Basic curl Command Examples You Can Run on Your Linux Server

cURL can be used in many different and interesting ways. With this tool you can download, upload and manage files, check your email address, or even update your status on some of the social media websites or check the weather outside. This article will introduce you to cURL with five basic command...
Read 0 Comments

Useful Vim Editor Plugins for Software Developers - Part 2: Syntastic

There's no doubt that Vim is a capable programming editor out-of-the-box, but it's the editor's plugins that help you make the most out of it. In the first part of this article series, we discussed a couple of programing-related Vim plugins (Tagbar and delimitMate). Continuing on the same path, in...
Read 0 Comments

Useful Vim editor plugins for software developers - part 1

An improved version of Vi, Vim is unarguably one of the most popular command line-based text editors in Linux. Besides being a feature-rich text editor, Vim is also used as an IDE (Integrated Development Environment) by software developers around the world. What makes Vim really powerful is the...
Read 0 Comments

sun-clouds.jpg

Sun through the clouds
Take the 6th annual North Bridge Future of Cloud survey.

Take the Future of Cloud Computing Survey

What’s next in cloud computing for you? Take the sixth annual Future of Cloud survey, led by North Bridge Venture Partners and Wikibon analysts, and contribute to one of the broadest and deepest explorations of cloud trends in the industry. Dozens of organizations, including The Linux Foundation,...
Read 0 Comments

What is DevOps? Bridget Kromhout Explains

Bridget Kromhout can be found traveling and speaking at conferences on a variety of DevOps topics. She is a global core organizer for devopsdays and is on the program committee for Velocity in addition to organizing local tech meetups in Minneapolis. She is a Principal Technologist for Cloud...
Read 0 Comments

Pages

Click Here!