Image
Understanding Linux file permissions, freeing up storage, and more tips for sysadmins
Check out Enable Sysadmin's top 10 articles from January 2023
Enable Sysadmin kicked off a strong 2023 in January. During the month, we published 22 new articles, achieved nearly 1,030,000 reads, and engaged with almost 691,000 readers. We're grateful to the Enable Sysadmin community for supporting this work as readers, as writers, and as future writers. (If you'd like to write for Enable Sysadmin, see our About page for information about submissions.)
Today, we are looking back at our top 10 articles of January 2023 to give you a chance to catch up on any of the great content you might have missed. In this list, you will see various topics covered, and we are confident that some, if not all, will be of interest to you. And if you'd like to catch up on our top articles from last year, check out our top guides and tutorials of 2022.
If these articles leave you feeling inspired, then we would love to hear from you. Send your article ideas or sysadmin tips to the team at enable-sysadmin@redhat.com.
Image
Understanding Linux file permissions (how to find them, read them, and change them) is an important part of maintaining and securing your systems.
Image
Get plugged into the top 10 networking articles of 2022 to learn how to troubleshoot network problems, automate your network, balance traffic, and more.
Image
Try the Top Disk Consumer Report Generator to help find files, directories, and deleted files that are consuming unnecessary storage on your system.
Image
Find out what's happening in the world of containers and how to better manage this technology in Enable Sysadmin's top 10 containers articles of 2022.
Image
Simplify your life by using ACLs to assign specific permissions for users or groups.
Image
Get a comprehensive view of your CPU, motherboard, RAM, and GPU information in a graphical or text interface.
Image
An ounce of prevention is worth a pound of cure.
Image
Learn about some of the RHEL features that can help you protect your systems from threats.
Image
Kubernetes provides two options to escalate permissions temporarily: impersonation headings and the impersonate verb.
Image
Groups are an essential part of the Linux permission structure and a powerful way to manage file access on your system.
Topics:
Linux
Vicki Walker
Vicki Walker is Managing Editor of Enable Sysadmin and Enable Architect for Red Hat. She has more than 20 years of experience in technology publishing for companies including InformationWeek.com, Dark Reading, SAP, BlackBerry, and Network Computing. More about me