The Zip Command in Linux: How to Zip Files and Directories

If you’re looking to archive your files and directories, regardless of your OS, “zip” is the format that is most popular and supported by the largest number of clients and operating systems. In this tutorial, we’ll go over how to use the applications in Linux to compress files and directories. The zip file format supports lossless data compression. Its origins go back to 1993, designed by Phil Katz of PKWARE […]

Read more →

 

Why is the Linux Logo a Penguin (Tux)?

The Beginning The use of a Penguin as logo/mascot for Linux was discussed first in early 1996 by several people in the linux-kernel mailing list. The idea of such a mascot came from Alan Cox first. Among many other suggestions made by different people, there were parodies of other operating system logos, sharks, or even eagles. You can find them here, and here’s a couple below: In May, 1996, Linus […]

Read more →

 

How to Perform Linux Server Monitoring with CloudStats

CloudStats is a powerful tool for Linux server monitoring and network monitoring. This Software-as-a-Service tool allows to track all key indicators of system health, such as CPU and RAM usage, apps and processes performance, network status and much more. The best thing is that CloudStats requires minimum technical skills from users and  is much cheaper than other existing software products for remote server monitoring. How it works Sign in into […]

Read more →

 

Linux df Command Usage Examples

This post about Linux df command opens series of articles for Linux newbies where you’ll find description and usage examples of major Linux commands like df, top, fsck, mount and so on. Introduction Linux df command can be used to display disk usage statistics for the file systems present on the Linux system. It’s handy tool to know which filesystem is consuming how much memory. Also, if a particular filename […]

Read more →

 

Linux Restricted Shells: rssh and scponly

Restricted shells like rssh and scponly give sysadmin the possibility to limit the operations that Linux user can do, for example you can create user that will be allowed to copy files via scp but won’t be permitted to login into system’s command line. This is quite important security feature that should be considered by every sysadmin to prevent unauthorized activity by users for example over SSH. If you have some online storage […]

Read more →