Array ( [category_name] => system-programming [error] => [m] => [p] => 0 [post_parent] => [subpost] => [subpost_id] => [attachment] => [attachment_id] => 0 [name] => [static] => [pagename] => [page_id] => 0 [second] => [minute] => [hour] => [day] => 0 [monthnum] => 0 [year] => 0 [w] => 0 [tag] => [cat] => 778 [tag_id] => [author] => [author_name] => [feed] => [tb] => [paged] => 1 [meta_key] => [meta_value] => [preview] => [s] => [sentence] => [title] => [fields] => [menu_order] => [embed] => [category__in] => Array ( ) [category__not_in] => Array ( ) [category__and] => Array ( ) [post__in] => Array ( ) [post__not_in] => Array ( ) [post_name__in] => Array ( ) [tag__in] => Array ( ) [tag__not_in] => Array ( ) [tag__and] => Array ( ) [tag_slug__in] => Array ( ) [tag_slug__and] => Array ( ) [post_parent__in] => Array ( ) [post_parent__not_in] => Array ( ) [author__in] => Array ( ) [author__not_in] => Array ( ) [ignore_sticky_posts] => [suppress_filters] => [cache_results] => 1 [update_post_term_cache] => 1 [lazy_load_term_meta] => 1 [update_post_meta_cache] => 1 [post_type] => [posts_per_page] => 10 [nopaging] => [comments_per_page] => 50 [no_found_rows] => [order] => DESC [orderby] => date )
System Programming

Learn How Puppet Is Used To Define Infrastructure As Code

When IT teams rely on old infrastructure management techniques such as manual configuration and creating scripts such a process is error prone and slow. Forward thinking organizations treat infrastructure like software and apply techniques used in software management in infrastructure management to speed up the infrastructure management process approaches such as version control, continuous integration

System Programming

Learn How to Set Up a Vagrant Development Environment

In this article, we will aim to achieve two objectives. The first objective will be to briefly introduce Vagrant. The second objective will be to demonstrate how to set up a Vagrant environment on Ubuntu. We can simply look at Vagrant as a tool that helps developers automate the creation of virtual machines (VMs) and

System Programming

Learn about Text Processing Tools in Red Hat Linux Administration – Part 3

Welcome to part three of About Text Processing Tools topic. The AWK Tool The awk command uses a set of user-supplied instructions to compare a set of files, one line at a time, to extended regular expressions provided by the user. Actions are then performed on each line that matches the criteria. The pattern matching

System Programming

Learn about Text Processing Tools in Red Hat Linux Administration – Part 2

Continuing what started in the previous article: Text Processing Tools. Following a Continually Growing Text File There will be cases wherein you need to monitor in real time any new appended data to a file. This is a common situation especially with log files. For this situation, the tail command is used with the –f

System Programming

Learn about Text Processing Tools in Red Hat Linux Administration – Part 1

Data is the most valuable asset for any organization. Data may be numeric: like integers that represent serial numbers, day of the month, and Julian date, and like floating-point decimals that represent monetary info, longitudes and latitudes. Data could be also in the form of strings of text that represent many types of information like

System Programming

Learn about Managing Services in Red Hat Linux Part 2

In the client/server model, a server is a computer that provides (runs) one or more services to clients. Managing Services is an essential part of your role as a system administrator. The previous article was part one talking about this topic, and here’s part two. Enabling and Disabling Services using ntsysv ntsysv is a simple

System Programming

Learn about Managing Services in Red Hat Linux Part 1

One of the most famous terms in the world of computers is the Client-Server Model. In this model, a computer could have one of two roles: either a client or a server (actually, it could be both). A server is a computer that runs one or more programs that serve other computers (clients). These programs

System Programming

Learn How to Manage Files Ownership and Permissions Part 2

In the previous article, we have discussed what file’s ownership and permissions are, and how they work. In this article, we are going to learn how to manage as Linux administrators the ownership and permissions of files and directories. Wish you nice reading. Changing Ownership of a File To change the owner and/or group of

System Programming

Learn How to Manage Files Ownership and Permissions Part 1

Understanding Files and Directories Security in Red Hat Security is no longer used at boundaries and perimeters only, but should be put in your internal network and even inside your systems as well. Each host should defend itself using personal firewalls, Host Intrusion Preventions Systems HIPS, Antivirus software, and etc. Even more, each file and

System Programming

Learn How to do Escalating User Privileges Red Hat Linux Part 2

Here is part two of the Escalating User Privileges topic. Have a nice reading. The /etc/sudoers File This file contains the policy rules that grant certain users and groups the rights to execute certain commands. Contents of the File The /etc/sudoers file consists of two main sets of configuration entries: Aliases Definitions. Privileges Specification Rules.