I want a Linux system without having to pay a Microsoft tax. The hardest part of using Linux is to find out the correct hardware. Hardware compatibility and drivers can be a big issue. But where one can find Linux desktops or Laptop for sale? Here are ten places to buy a preinstalled Linux Desktop and Laptop in alphabetical order.
Linux / Unix Hardware
News and tutorials about computer, server hardware, and operating systems that is used by Information Technology (IT) professionals and data centers ( rss feed ).
Tape devices should be used on a regular basis only for archiving files or for transferring data from one server to another. Usually, tape devices are all hooked up to Unix boxes, and controlled with mt or mtx. In this tutorial you will learn about:
- Tape device names
- Basic commands to manage tape drive
- Basic backup and restore commands
Do you want to display a super cool logo of your Linux distribution along with basic hardware information? Look no further try awesome screenfetch and linux_logo utilities.
You can use the following tools to see how long system has been running on a Linux or Unix-like system:
- uptime : Tell how long the server has been running.
- lastt : Show the reboot and shutdown time.
- tuptime : Report the historical and statistical running time of system, keeping it between restarts. Like uptime command but with more interesting output.
For new computer or Laptop or server, I need to collect the information about its hardware. This is also useful when you need to replace a disk or memory with a vendor. In order to replace hardware you need all information in advance. In this post, I'm going to list commands that you can use to collect the hardware information.
Cloud storage is nothing but an enterprise-level cloud data storage model to store the digital data in logical pools, across the multiple servers. You can use a hosting company such as Amazon, Google, Rackspace, Dropbox and others for keeping your data available and accessible 24x7. You can access data stored on cloud storage via API or desktop/mobile apps or web based systems.
In this post, I'm going to list amazingly awesome open source cloud storage engines that you can use to access and sync your data privately for security and privacy reasons.
Can't write to the hard disk on a Linux or Unix-like systems? Want to diagnose corrupt disk issues on a server? Want to find out why you are getting "disk full" messages on screen? Want to learn how to solve full/corrupt and failed disk issues. Try these eight tips to diagnose a Linux and Unix server hard disk drive problems.
Cloning is nothing but the copying of the contents of a server hard disk to a storage medium (another disk) or to an image file. Disk cloning is quite useful in modern data centers for:
- Full system backup.
- System recovery.
- Reboot and restore.
- Hard drive upgrade.
- Converting a physical server to virtual machine and more.
In this post, I'm going to list the Free and Open Source Software for Disk Imaging and Cloning that you can use for GNU/Linux, *BSD and Mac OS X desktop operating systems.
Today I will be talking about ansible, a powerful configuration management solution written in python. There are many configuration management solutions available, all with pros and cons, ansible stands apart from many of them for its simplicity. What makes ansible different than many of the most popular configuration management systems is that its agent-less, no need to setup agents on every node you want to control. Plus, this has the benefit of being able to control you entire infrastructure from more than one place, if needed. That last point's validity, of being a benefit, may be debatable but I find it as a positive in most cases. Enough talk, lets get started with Ansible installation and configuration on a RHEL/CentOS, and Debian/Ubuntu based systems.
You can dump Linux or Unix server memory. This is useful for forensics analysis, and testing your own system. This is often desirable to see:
- What code and what data actually resides in memory.
- You can search for specific pids memory.
- Search memory for string and other data such as passwords.
- Works as add-on tool for gdb and others.
- Search/replace/dump memory from running processes and core files.
- All kinds of deep hacking activities that simply saves your time and solve problems.