Skip to content

SysTutorials

  • Tutorials
  • Linux
  • Linux Manuals
  • Systems
  • Programming
  • Software
  • Subscribe
  • Search
SysTutorials

  • Linux | Network | Tutorial

    Configuring Static Ports for NFSv3 RPC Services

    ByEric Ma Oct 25, 2013Apr 10, 2026

    NFSv3 uses multiple RPC services, each requiring its own port assignment. Without explicit configuration, rpcbind assigns random high ports to four critical services, making firewall rules unmaintainable. Modern deployments should prioritize NFSv4 with Kerberos, but legacy NFSv3 environments remain common enough to warrant proper port management. The NFS service stack includes seven RPC programs: Service…

    Read More Configuring Static Ports for NFSv3 RPC ServicesContinue

  • Linux | Tutorial

    SSH Port Forwarding: Local, Remote, and Dynamic Tunnels

    ByEric Ma Sep 29, 2013Apr 10, 2026

    SSH port forwarding lets you tunnel network traffic through an encrypted connection, making it essential for accessing services on restricted networks, exposing local services safely, or routing traffic through a jump host. This guide covers the three main types and production-ready practices. Local Forwarding Local forwarding listens on your local machine and relays connections through…

    Read More SSH Port Forwarding: Local, Remote, and Dynamic TunnelsContinue

  • Linux | Tutorial

    Installing AMD GPU Drivers on Fedora: A Setup Guide

    ByEric Ma Sep 25, 2013Apr 10, 2026

    The proprietary fglrx driver reached end-of-life in 2015 and is incompatible with current Fedora releases. For modern AMD GPUs, use AMDGPU—AMD’s actively maintained open-source driver that supports Wayland, current kernel versions, and both desktop and compute workloads. GPU Compatibility RDNA and newer (RX 5000 series and later): AMDGPU is required and fully supported. GCN-era Radeons…

    Read More Installing AMD GPU Drivers on Fedora: A Setup GuideContinue

  • Linux | Tutorial | Virtualization

    Managing CPU and Memory in Xen Dom0 Environments

    ByEric Ma Sep 25, 2013Apr 10, 2026

    Xen remains in production use at scale across AWS EC2, Citrix Hypervisor, and various cloud providers, though KVM has become the default hypervisor for most Linux distributions. If you’re operating a Xen environment, Dom0 resource management is critical to system stability. Why Dom0 Resource Management Matters Dom0 performance directly affects your entire virtualized infrastructure. Since…

    Read More Managing CPU and Memory in Xen Dom0 EnvironmentsContinue

  • Linux

    OpenLDAP and NFS for Centralized User Authentication

    ByEric Ma Sep 25, 2013Apr 10, 2026

    This guide sets up OpenLDAP for centralized authentication and NFS with automount to provide unified home directories across a cluster. The setup uses modern OpenLDAP backends and current NFS4 best practices. System Environment Server: LDAP and NFS: 10.0.0.2, Fedora 41 x86_64 Base DN: dc=lgcpu1 Clients: Range: 10.0.0.1/24, Fedora 41 x86_64 LDAP Server Setup Package Installation…

    Read More OpenLDAP and NFS for Centralized User AuthenticationContinue

  • Linux | Programming

    UDP Socket Programming in C: Building Practical Applications

    ByEric Ma Sep 10, 2013Apr 9, 2026

    UDP (User Datagram Protocol) defined in RFC 768 provides a lightweight alternative to TCP. Unlike TCP’s stream-oriented approach, UDP delivers discrete packets — each recvfrom() or recvmsg() call returns one complete datagram. The tradeoff is real: you gain speed and lower overhead, but lose automatic reliability guarantees. Your application must handle packet loss, reordering, and…

    Read More UDP Socket Programming in C: Building Practical ApplicationsContinue

  • Programming

    Choosing the Right Timer: clock_gettime vs TSC in Linux

    ByEric Ma Sep 5, 2013Apr 10, 2026

    Measuring time accurately matters for performance profiling, benchmarking, and latency-sensitive applications. Linux provides several APIs with different tradeoffs in resolution, overhead, and reliability. Understanding which to use prevents subtle bugs in production code. POSIX Time APIs: gettimeofday and clock_gettime gettimeofday() and clock_gettime() are the standard POSIX calls for reading system time. gettimeofday() returns seconds and…

    Read More Choosing the Right Timer: clock_gettime vs TSC in LinuxContinue

  • Insights

    Measuring System Performance: Lessons from Ousterhout

    ByEric Ma Sep 4, 2013Apr 10, 2026

    John Ousterhout, a professor of computer science at Stanford, maintains a collection of “Favorite Sayings” grounded in decades of building real systems—RAMCloud, Tcl, and extensive work in distributed systems. These aren’t abstract principles. They’re lessons that apply directly to the work of building, debugging, and shipping software at scale. Optimize After Measurement, Not Before The…

    Read More Measuring System Performance: Lessons from OusterhoutContinue

  • Linux | Tutorial

    Recovering from fstab Boot Failures: A Practical Guide

    ByEric Ma Aug 25, 2013Apr 10, 2026

    When /etc/fstab contains errors or your hardware configuration changes, the system may fail to boot or hang during the mount phase. You can recover by modifying kernel parameters at boot time to bypass automatic mounting, then repair the configuration. Method 1: Boot to Single-User Mode Single-user mode skips mounting filesystems listed in fstab, letting you…

    Read More Recovering from fstab Boot Failures: A Practical GuideContinue

  • Linux

    Automating Password Changes on Linux: passwd, chpasswd, and Safer Methods

    ByEric Ma Aug 25, 2013Apr 10, 2026

    The passwd command is designed for interactive use—it prompts for input rather than accepting passwords via stdin by default. When you need to set passwords programmatically (bulk user provisioning, CI/CD automation, remote administration), you need methods that bypass the interactive prompt. Using passwd with –stdin The –stdin flag tells passwd to read the new password…

    Read More Automating Password Changes on Linux: passwd, chpasswd, and Safer MethodsContinue

  • Linux

    Using Root Access Safely on Ubuntu

    ByThirumal Venkat Aug 23, 2013Apr 10, 2026

    Ubuntu locks the root account by default as a safety measure—it prevents accidental system damage and enforces audit trails through sudo. If you genuinely need direct root access, here’s how to enable it and the security tradeoffs involved. Set a root password The simplest approach: sudo passwd root You’ll be prompted to enter and confirm…

    Read More Using Root Access Safely on UbuntuContinue

  • Web

    WordPress Anti-Spam: Essential Plugins and Setup Tips

    ByEric Ma Aug 8, 2013Apr 10, 2026

    WordPress spam attacks come in three distinct categories: comment spam, user registration abuse, and brute-force login attempts. A layered defense using complementary plugins and server-level hardening handles all three effectively. Comment Spam Protection Akismet remains the industry standard for comment filtering. It ships with WordPress by default and uses machine learning trained on millions of…

    Read More WordPress Anti-Spam: Essential Plugins and Setup TipsContinue

  • Linux | Network

    Setting Up a SOCKS5 Proxy on iOS via SSH Tunnel

    ByEric Ma Aug 3, 2013Apr 10, 2026

    iOS doesn’t expose SOCKS proxy settings in the Settings UI, but it supports Proxy Auto-Config (PAC) files natively. This lets you route iOS traffic through an SSH tunnel on a Linux/Unix host without installing a VPN app. Prerequisites iOS device (iPhone/iPad) on WiFi Linux/Unix host (same network or internet-accessible) with SSH access Web server to…

    Read More Setting Up a SOCKS5 Proxy on iOS via SSH TunnelContinue

  • Computing systems | Insights | Storage systems | Systems

    Latency Numbers Every Systems Engineer Should Know

    ByEric Ma Jul 18, 2013Apr 9, 2026

    Jeff Dean’s foundational work on large-scale distributed systems at Google established performance metrics that remain essential for making sound architectural decisions. While absolute numbers shift with hardware advances, the relative orders of magnitude have proven remarkably stable. These latency figures represent the raw cost of fundamental operations. Understanding them prevents decisions that seem reasonable in…

    Read More Latency Numbers Every Systems Engineer Should KnowContinue

  • Linux

    Copy Command Output to Clipboard in Linux

    ByEric Ma Jul 18, 2013Apr 10, 2026

    xclip is a utility that bridges the command line and X11 selections, letting you pipe command output directly to your clipboard. It’s indispensable for workflows where you’re generating content in the terminal and pasting it elsewhere—whether that’s a browser, text editor, or another application. Installation On Fedora/RHEL-based systems: sudo dnf install xclip On Debian/Ubuntu: sudo…

    Read More Copy Command Output to Clipboard in LinuxContinue

  • Computing systems | Tutorial

    Hadoop MapReduce: When to Use It and Deployment Strategies

    ByEric Ma Jul 17, 2013Apr 10, 2026

    MapReduce is a foundational distributed computing model, but it’s no longer the default choice for new projects. Hadoop’s MapReduce (via YARN in Hadoop 2.x+) remains production-stable and useful for specific scenarios, while Apache Spark, Flink, and cloud-native services handle most modern workloads more efficiently. When MapReduce Still Makes Sense Use MapReduce if you’re: Maintaining existing…

    Read More Hadoop MapReduce: When to Use It and Deployment StrategiesContinue

  • Web

    Configuring MediaWiki’s Main Page: Redirects and Best Practices

    ByEric Ma Jul 16, 2013Apr 10, 2026

    MediaWiki stores its main page configuration in the MediaWiki:Mainpage system message. By default, this points to “Main Page”, but you can change it to any title that suits your wiki’s purpose. This process involves updating the system message, creating your new homepage, and handling redirects properly to avoid breaking external links and SEO. Step 1:…

    Read More Configuring MediaWiki’s Main Page: Redirects and Best PracticesContinue

  • Web

    Customizing MediaWiki’s Sidebar: A Configuration Guide

    ByEric Ma Jul 16, 2013Apr 10, 2026

    MediaWiki’s sidebar is managed through the MediaWiki:Sidebar special page, a simple text-based system that controls navigation for your entire wiki. Changes take effect immediately across all pages. Accessing the Sidebar Configuration Navigate to the sidebar editor using one of these methods: Direct URL (replace example.com with your domain): With pretty URLs: https://example.com/w/MediaWiki:Sidebar Without pretty URLs:…

    Read More Customizing MediaWiki’s Sidebar: A Configuration GuideContinue

  • Software

    SSH Tunneling on Windows: Creating a SOCKS Proxy with OpenSSH

    ByEric Ma Jul 15, 2013Apr 10, 2026

    SSH tunneling on Windows routes your traffic through a remote server over an encrypted connection, letting you bypass network restrictions and access resources as if you were on the remote network. The setup creates a SOCKS proxy that listens locally and forwards all traffic through the SSH tunnel. The traffic flow is straightforward: Your application…

    Read More SSH Tunneling on Windows: Creating a SOCKS Proxy with OpenSSHContinue

  • Web

    Device-Specific Skins in MediaWiki: Setup & Configuration

    ByEric Ma Jul 15, 2013Apr 10, 2026

    Modern MediaWiki installations should prioritize responsive design, but you may still need explicit device-based skin switching for specific use cases. This guide covers both approaches and how to implement them correctly. Responsive Skins: The Recommended Approach The default solution is using a responsive skin that adapts automatically to screen size without separate configuration. Vector 2022…

    Read More Device-Specific Skins in MediaWiki: Setup & ConfigurationContinue

Page navigation

Previous PagePrevious 1 … 56 57 58 59 60 … 70 Next PageNext

© 2026 SysTutorials

  • Tutorials
  • Linux
  • Linux Manuals
  • Systems
  • Programming
  • Software
  • Subscribe
  • Search