Home Search
unix - search results
If you're not happy with the results, please do another search
Patches Available for Linux sudo Vulnerability
Red Hat, Debian and other Linux distributions yesterday pushed out patches for a high-severity vulnerability in sudo that could be abused by a local...
An Introduction to Libral, A Systems Management Library for Linux
Libral provides a uniform management API across system resources and serves as a solid foundation for scripting management tasks and building configuration-management systems.
Linux, in...
A Brief Look at the Roots of Linux Containers
In previous excerpts of the new, self-paced Containers Fundamentals course from The Linux Foundation, we discussed what containers are and are not. Here, we’ll...
Creating Virtual Machines in KVM: Part 1
So, you want to stuff your Linux laptop or PC full of virtual machines and perform all manner of mad experiments. And so you...
Stricter Immigration Policies Crimp U.S. Open Source Development
What do Linus Torvalds, Dirk Hohndel, Michael Widenius, Solomon Hykes, Nithya Ruff, Sam Ramji, Lennart Poettering, Boris Renski, Madhura Maskasky, Theodore Ts’o, Wim Coekaerts, and Mark Shuttleworth all have in common? Each of them has founded or...
Configure And Use Linux-PAM
In a previous post, we talked about Linux iptables firewall, and some people asked about authentication. Today we will talk about the powerful framework...
Secure your Samba Authentications Automatically via OpenVPN
Samba 4 has become the tool of choice to provide Linux-based identity management to diverse clients.
However, a growing number of organizations are offering work...
Probe Your Linux Sockets With ss
We all know and love netstat (network statistics), because it is a wonderful tool for viewing detailed network connection information. An interesting alternative is...
Python vs. R: The Battle for Data Scientist Mind Share
The difference between Python and R is largely philosophical. One is a full-service language developed by Unix scripters that happened to be adopted by...
Tracing the User Space and Operating System Interactions
Like the bug that no one can solve, many issues occur on the interface between the user application and the operating system. But even...