Sandra Henry-Stocker was a programmer, Linux systems administrator, security engineer and Linux journalist for most of her 30-year career. She describes herself as "USL" (Unix as a second language) but remembers enough English to write books and buy groceries. She lives in the mountains in Virginia where, when not working with or writing about Unix, she's chasing the bears away from her bird feeders. Tune into her 2-Minute Linux video tutorials and take command of your command line.
Choosing the right tool -- Secure Copy, Samba, or Rsync -- for the right job
Knowing when to pipe and when not to pipe remains a sign of Unix mastery
Finding a computer infection that is designed to remain hidden is not easy, but neither is it impossible
If a rootkit is hiding files, processes, log-ins, etc., how would you know? If you can't see it, how would you remove it?
Rootkits remain one of the stealthiest and most worrisome forms of malware compromising systems today
If you've ever wondered how Unix systems identify files, you might be surprised to learn that file names aren't an important factor
How to collect Linux performance statistics and use them to right-size swap files and partitions
Useful Linux commands for examining memory usage and what the numbers mean
Take advantage of these simple text processing tricks using Perl