136 private links
I recently asked our writer community to share with us what they're reading. These folks come from all different walks of life and roles in tech. What they have in common is that they are living and breathing Linux and open source every day.
Drink in this fantastic list. Many of them are free and available to download.
You may see books you've been meaning to get around to, books that are completely new to you, and some that feel like old friends.
One of the things that makes the shell an invaluable tool is the amount of available text processing commands, and the ability to easily pipe them into each other to build complex text processing workflows. These commands can make it trivial to perform text and data analysis, convert data between different formats, filter lines, etc.
When working with text data, the philosophy is to break any complex problem you have into a set of smaller ones, and to solve each of them with a specialized tool.
Once in a while a new program really surprises me. Reminiscing a while
ago, I came up with a list of eye-opening Unix gems. Only a couple of
these programs are indispensable or much used. What singles them out is
their originality. I cannot imagine myself inventing any of them.
Meld is a visual diff tool that makes it easier to compare and merge changes in files, directories, Git repos, and more.
As we can see the default Linux disk encryption implementation has a significant impact on our cache latency in worst case scenarios, whereas the patched implementation is indistinguishable from not using encryption at all. In other words the improved encryption implementation does not have any impact at all on our cache response speed, so we basically get it for free! That’s a win!
Ever considered setting up and running your very own git server? It’s actually quite easy! In this post, I’ll outline the steps I took to set up my own so that you can give it a try yourself. But first, why might you even want to go through the trouble of setting up your own server?
After all, there are a wide array of excellent and free to use choices out there, such as GitHub, GitLab, and the up-and-coming sourcehut.
One reason is ownership: in today’s world of corporate surveillance, rampant privacy violations, and data breaches, there is something to be said of truly owning your own data. Both git and the web itself were designed and built on principles of decentralization and distribution. Standing up your own server is one way to tap into that heritage.
It’s also just plain fun, at least if you’re into that sort of thing. You get to build something useful and put your name on it. It’s something you control. You get to decide how it works, how it looks, who can access it, and what exists on it.
Setting up a git server is actually relatively straight-forward. Almost all of the heavy lifting is done by git itself, but I will also introduce a few supplementary tools to handle things like access control and HTTP access.
Pipes are cool! We saw how handy they are in a previous blog post. Let’s look at a typical way to use the pipe operator. We have some output, and we want to look at the first lines of the output. Let’s download The Brothers Karamazov by Fyodor Dostoevsky, a fairly long novel.
SSH is a powerful tool which often grants a lot of access to anyone using it to log into a server. In this post, I’m going to talk about a few different ways that you can easily improve the security of your SSH model without needing to deploy a new application or make any huge changes to user experience.
This article is about how pipes are implemented the Unix kernel. I was a little disappointed that a recent article titled “How do Unix pipes work?” was not about the internals, and curious enough to go digging in some old sources to try to answer the question.
he /sbin/mount.nfs helper program is provided by nfs-common. You can install it with:
sudo apt install nfs-common
sudo mount 192.168.1.5:/home/shared /mnt/common
sudo fdisk -l /dev/sdd
sudo mdadm --examine /dev/sdd4
sudo mdadm -A -R /dev/md9 /dev/sdd4
sudo mount /dev/md9 /mnt/old_hdd/
In the 1960s-1970s, Ken Thompson co-invented the UNIX operating system along with Dennis Ritchie at Bell Labs. He also worked on the language B, the operating system Plan 9, and the language Go. He and Ritchie won the Turing Award. He now works at Google. He’ll be interviewed Brian Kernighan of “K&R” fame. This talk took place May 4, 2019. Videography courtesy of @thegurumeditation (Facebook), @thegurumeditate (Twitter)
Parameter expansion is the procedure to get the value from the referenced entity, like expanding a variable to print its value. On expansion time you can do very nasty things with the parameter or its value. These things are described here.
A screencast tool to display your keys, inspired by Screenflick.
This is an almost-complete rewrite of screenkey 0.2, featuring:
Several keyboard translation methods
Key composition/input method support
Configurable font/size/position
Highlighting of recent keystrokes
Improved backspace processing
Normal/Emacs/Mac caps modes
Multi-monitor support
Dynamic recording control
Switch for visible shift and modifier sequences only
Repeats compression
Countless bug fixesA screencast tool to display your keys, inspired by Screenflick.
This is an almost-complete rewrite of screenkey 0.2, featuring:
Several keyboard translation methods
Key composition/input method support
Configurable font/size/position
Highlighting of recent keystrokes
Improved backspace processing
Normal/Emacs/Mac caps modes
Multi-monitor support
Dynamic recording control by pressing both control keys
Switch for visible shift and modifier sequences only
Repeats compression
Countless bug fixesShows the current Version and Service Level of the installed DB2® product. Output from this command goes to the console by default.
What Fix-pack(s), Component-refresh(s), and/or iFixes are installed in a given IBM Connections deployment?