Showing headlines posted by eggi
« Previous ( 1 ... 11 12 13 14 15 16 17 ... 18 ) Next »Using Traps Outside Of Shell Scripts On Unix Or Linux
How to set, and reset, traps at the command line, and login, level to enhance system security.
Double Spacing In Awk, Perl and Shell on Linux and Unix
A small tutorial on how to use awk, Perl and the shell to double space between lines. Hopefully this answers all requests for additional material :)
Variable MultiLine Spacing With Sed On Linux Or Unix
A small tutorial on how to use sed to double, triple, quadruple, etc, your space between lines. Also looks at the "r"ead and "w"rite operators.
AIX Unix LVM Destruction Commands. Part Two of Two.
Looking at destruction commands for LVM on AIX. Part 2 of a 2 part post.
Using LVM on AIX Unix. Part One Of No More Than Two.
Looking at creation and display/monitoring commands for LVM on AIX. Part 1 of a 2 part post.
Basic I/O Redirection Differences In Sh/Ksh, Bash and Zsh On Linux And Unix
A look at how I/O redirection works slightly differently in different shells.
UnConfusing The Issue Of Disabling Root On Linux or Unix
A look at various ways to secure the root account against system users and some in-use methods that seem to cause more harm than good.
Dealing With ZFS-Rooted Zones on Solaris 10 Unix
How to attempt to work around the fact that Solaris 10 zones, living on zfs rooted filesystems, can't be handled properly by Sun's Solaris 10 upgrade!
Using Strings To Safely Get Program Usage Information On Linux And Unix
How to find out what options a command takes, and what it does, when you have no clue what it's used for and don't want to make a huge mess!
Simple Cumulative Math Using Awk On Unix or Linux
Using Awk to do incremental, or cumulative, addition, subtraction, multiplication or division, etc.
Fast Perl HTML Pod Creation On Linux And Unix
Simple bash script to use pod2html to create a one-stop reference page for all available POD documentation from your installed Perl distribution.
Fight Phishing From The Unix Or Linux Command Line
Discussion of phishing schemes and ways to counter them effectively.
SunCluster Quick Command Reference
Quick command reference, cheat sheet or crib sheet, for SunCluster Administration. Pick your descriptive of choice :)
Mirroring Your Boot Disk Using Veritas On Sun Without Encapsulation
Using the Trantham/Howard Method to setup your boot disks using Veritas Volume Manager on Solaris without encapsulation.
Simple Perl Script To Ease Console Server Use On Linux And Unix
Perl script to manage connections to console server ports written for Linux or Unix.
Linux And Unix System Security Wrap-Up - Part 4b
Part six of our now completed series on setting up Linux and Unix servers securely. At least, it's the end of the beginning...
Securing Your Linux Or Unix System - Part 4a
Part five of a, now, 6 part post series on setting up Linux and Unix servers securely.
Linux and Unix Software Security Basics - Part 3
Part four of a five part post series on setting up Linux and Unix servers securely.
Security Basics For Linux and Unix Installations - Part 2
Part three of a five part post series on setting up Linux and Unix servers securely.
Installation Security Baselines For Linux and Unix - 1b
Part two of a five part post series on setting up Linux and Unix servers securely.