Generally, the reasons for not using shell loops for text processing are conceptual, reliability, legibility, performance and security. Read on to see the explanation for each.
Maybe you're trying to move or delete a file in Linux and get a "device or resource busy" message. Here's how to work around it.
SSH is a protocol that can help you manage a remote computer, as well as let you upload and download files. You can also use SSH keys instead of a password!
Today, GNU/Linux based operating systems are considered to be among the most secure available. They're used by a majority of the largest super computers we have available, far outpacing the amount of computers running UNIX or Windows. And one of the reasons Linux holds its reputation for security is the way it handles user access. Its user and group control functions was developed around the time of the first UNIX systems, and these controls allow file owners to control access to reading, execution, and writing of files, directories, processes and other system tools.
Monit is a very popular and lightweight Linux server monitoring tool used by the system administrators around the world.It's free, it's easy to use- what's not to like. Besides monitoring, it can be used to restart programs that are misbehaving, as well as check files and directories for changes, and monitor network connections to remote servers. Monit also allows user scripts, so you can monitor whatever you ask it to (nicely)! Today we'll demonstrate a simple, but practical, script to have Monit check a MySQL process running and restart it automatically if it’s stopped or not responding!
Reverse SSH tunneling is supposed to get your around finicky firewall rules... right? Well, click the article let's check it out.
If you need to monitor your CPU and Ram use... well, you should use ServerSuit! That's why we're here! If you wanted a more granular look on your own system though, we don't want to leave you hanging. Here's our article for monitoring individual processes.
The Linux OS isn't aware of DNS by default, so you have to use a service to make this check. Fortunately, it's incredibly easy.
Linux supports virtual memory, that is, using a disk as an extension of RAM so that the effective size of usable memory grows correspondingly. The kernel will write the contents of a currently unused block of memory to the hard disk so that the memory can be used for another purpose. When the original contents are needed again, they are read back into memory. This is all made completely transparent to the user; programs running under Linux only see the larger amount of memory available and don't notice that parts of them reside on the disk from time to time.