Linux: We need Tiling Desktop Environments

The Linux ecosystem is renowned for its diversity and flexibility, boasting a wide array of distributions (distros) catering to various user needs. However, while there are around a hundred popular and actively maintained Linux distros to choose from, the number of available desktop environments (DEs) pales in comparison. In this blog post, we will discuss […]

After 10 Yrs of Linux, I Switched to Windows. What next?

I’m looking forward to hearing from experienced Windows users who also use Linux and learning some tips on enhancing my experience on Windows 10 and 11. As a Linux user, you may wonder why someone would ever consider replacing it with Windows. Be nice! It is always valuable to explore how well competing operating systems […]

cp command in Linux with examples

The cp command in Linux is a powerful tool that is used to copy files and directories from one location to another. It is an essential tool for managing files and directories on the Linux (and other UNIX based systems) command line, and its functionality extends to a wide range of use cases. This guide […]

sudo command in Linux with examples

The sudo command in Linux is one of the most important and widely used commands for managing system permissions. It allows you to run a command as the superuser, giving you elevated privileges that are necessary for performing administrative tasks on the system. This article is a follow-up to the previous 90 Linux Commands frequently used […]

SSH command in Linux, with examples

This article is a follow-up to the previous 90 Linux Commands frequently used by Linux Sysadmins post. Every week, as time allows, I will publish articles on the 90 commands geared toward Linux sysadmins and Linux power users.   What is the SSH command? The ssh command in Linux is an acronym for Secure Shell, which is […]

SSH Security: Protecting Your Linux Server from Threats

As an essential tool for managing servers, SSH (Secure Shell) provides a secure way to remotely access a server’s command line. However, for best SSH security, it’s crucial to limit SSH access to specific IP addresses to reduce the risk of unauthorized access and brute force attacks. In this blog post, we’ll discuss methods to […]

Boost Your Linux Command Line Productivity, Part 1

Welcome to the first part of a series of command line tips to boost your Linux productivity. The command line interface can be a lifesaver for those who work on these systems regularly. In this series, we will explore five ways to help you work faster and more efficiently on Linux servers (or Linux desktops) […]

Fix “Host key verification failed”

“Host key verification failed” is a common error message that can occur when trying to connect to a remote server via Secure Shell (SSH). This error can be frustrating, but it’s actually a security feature that can be easily resolved. In this blog post, we will first look at how to fix this error, then […]

Linux top: Here’s how to customize it

The top command – referred to below as Linux top – is a command on Unix and Unix-like systems such as Linux, which provides a dynamic real-time overview of a running system. It can display system summary information and a list of processes or threads currently managed by the Linux kernel. The types of system […]

MySQL 8 sample config (my.cnf example) and tuning.

With the release of MySQL 8 I wanted to paste my tuned my.cnf (MySQL configuration file) for discussion, suggestions, and questions. To get the most out of your MySQL 8 installation, you will need to configure it correctly and tune the settings for your specific use case. In this blog post, we will discuss my […]