Featured »

March 2, 2022 – 2:00 pm

Books have been written on the subject of awk and sed. Here’s a small sample of commands I put together over the years that are useful for everyday system administration tasks. Most of these tasks …

Read the full story »
Networking

Unix and Linux network configuration. Multiple network interfaces. Bridged NICs. High-availability network configurations.

Applications

Reviews of latest Unix and Linux software. Helpful tips for application support admins. Automating application support.

Data

Disk partitioning, filesystems, directories, and files. Volume management, logical volumes, HA filesystems. Backups and disaster recovery.

Monitoring

Distributed server monitoring. Server performance and capacity planning. Monitoring applications, network status and user activity.

Commands & Shells

Cool Unix shell commands and options. Command-line tools and application. Things every Unix sysadmin needs to know.

Home » Archive by Category

Articles in Featured

iPhone 3GS OS4 Upgrade

September 4, 2010 – 5:23 pm
iphone4

iTunes for Windows must be one of the buggiest, most poorly written applications out there. In terms of wasted months of your life it definitely ranks up there with Lotus Notes and Media Player 12. I don’t know how well iTunes works on a Mac (I like computer mice with twenty buttons, so I never was a big Mac fan), but I think I read somewhere that iTunes for Windows is the leading cause of suicides among iPhone owners.

Gadget Review: D-Link DNS-321 NAS

August 1, 2010 – 10:51 am

The D-Link DNS-321 is among the least expensive dual-disk RAID NAS systems currently on the market. This small device offers an impressive array of features such as FTP, Samba, NFS, iTunes, DHCP, HTTP and UPnP …

Gadget Review: Sony PRS-900 eBook Reader

April 26, 2010 – 3:37 am

I have a ton of technical documentation in PDF format. Sometimes I need to browse this collection to find some specific piece of information. In other cases I may need to read an entire book …

Server and Network Monitoring with iPhone

February 25, 2010 – 6:53 pm
apple_0006

What is a Unix sysadmin doing with an iPhone, you ask? It was a birthday present, if that’s all right with you. I know, I should have gotten something odd with a beta version of …

Linux and High I/O Wait

December 21, 2008 – 12:07 am
network_cable_01

When you look at the CPU activity of your computer, one of the parameters is the iowait. This value shows how much time your CPU wastes while it is waiting for I/O operations for complete. …

Data Security and Online Privacy

June 9, 2008 – 4:57 pm
computer_security_0005

You have information on your computer that you don’t want others to see. Sometimes you want to share information with someone, but you don’t want anyone to know that you are the one sharing it. Let’s say that you came across some information suggesting that your employer may be breaking law. You want to make this information public, but you can’t do it openly becausloe you will be fired. Another example: you are at work and you need to send a personal, confidential email…

Effective Virus Protection

May 28, 2008 – 5:13 pm
Computer Password Security

How do you protect your computer from viruses? Most computer users just buy antivirus software, install it, and reboot their PC – done. If only it was that easy. Over the past several years percentage of home and business computers infected with viruses has been steadily growing. Most PCs are sold these days with preinstalled antivirus software. And yet, the number of infected computers keeps on growing…

Highly redundant array configuration

May 8, 2008 – 3:58 pm
hard_disk_drive_hdd_0005

The cost of storage arrays is falling along with the quality of their manufacture. To quote Lev Andropov from the “Armageddon”: “Components. American components, Russian Components, ALL MADE IN TAIWAN!” What in the nineties used …

AI Research: Playing Mind Games

April 23, 2008 – 3:26 am

The news of Artificial Intelligence research always attracted my attention. I myself was a fan of new technology, especially I am a gamer as well and my friends, looting and trading diablo 2 items for …

Your unsecured Wi-Fi network

April 21, 2008 – 2:43 am
wireless access point ap

Network World reports this week that, according to a study by Accenture, some twelve percent of computer users are connecting to some else’s unsecured Wi-Fi networks. So here’s the question I wanted to discuss: is …