Jump to content


 Photo

IDG Contributor Network: How to learn Unix/Linux

Today, 09:17 AM

Posted by Computerworld in Computerworld News

Every month or two, someone asks me how they should go about learning Unix. The short answer is always "use it" or maybe as much as "use it -- a lot."

But the detailed answer includes a lot of steps and a good amount of commitment to spending time working on the command line. I may have learned some of the most important parts of making my way on the Unix command line the first week that I used it back in the early 80's but I had to spend a lot of time with it before I was really good. And I'm still learning new ways of getting work done 30+ years later. So here is my detailed answer.

Get access!

The first thing you really need to do if you want to learn how to be productive on the Unix command line is to get access to a system and start working on the command line. One way to do this is to set yourself up with a "live" distribution of Linux -- one that runs from a USB drive or DVD. That way you can both use the Linux desktop and open a terminal window to start trying commands. If you don't mind sacrificing the existing OS on your system, you can install the OS directly on your disk, but using a live version gives you a chance to sample a number of distributions before you pick the one you want to stick with for a while. Knoppix, Mint, Ubuntu, Fedora, Elementary OS and others are easy to boot and use live. Not sure where to start? Some of the distributions that look really good in 2017 are described in CIO.

To read this article in full or to leave a comment, please click here



View the full article

0 Views · 0 Replies

 Photo

Insecure security cameras sound like a joke, but aren’t

Today, 07:00 AM

Posted by Computerworld in Computerworld News

Reports recently surfaced that Google was alerted to security holes in its IoT security camera products and declined to patch them. This was quite frightening for two reasons. First, the fix was apparently straightforward, and second, the hole was readily and easily available to burglars with even a modicum of tech savviness.

Meanwhile, eBay seems to be encouraging users to downgrade their security defenses by giving up the hardware tokens they use for two-factor authentication and relying on text messages instead. Yes, eBay suggested that users make themselves more vulnerable to identity thieves. With these two recent incidents, is it any wonder that IT is suspicious about whether major companies are taking security seriously?

To read this article in full or to leave a comment, please click here



View the full article

1 Views · 0 Replies

 Photo

What it takes to become an IT security engineer

Today, 06:56 AM

Posted by Computerworld in Computerworld News

When Scott Copeland got his associate degree in network administration back in 2004, the community college he attended didn’t offer IT security courses, “but it gave me the foundation to learn more about network security,” he says. His determination and thirst for learning led him to his current job as an IT security engineer at FedEx Services in Memphis, Tenn.

To read this article in full or to leave a comment, please click here

(Insider Story)

View the full article

1 Views · 0 Replies


Latest Discussions

Site Navigation

Online Users

2 members, 38 visitors and 0 anonymous users

Bing, Google, Corrine, Yahoo, raymac46


Portal v1.1.0 by DevFuse | Based on IP.Board Portal by IPS