10 Linux commands you should never execute

10 Linux commands you should never execute

Linux commands are useful and productive, but sometimes they may be dangerous, specially when you are not an expert on the tasks you are performing.

That’s why it is highly recommended to double chek these commands below before executing them:

rm -rf: It is one of the fastest way to wipe out a folder and its content.

:(){:|:&};:: It keeps on executing one function again and again untill the system freezes.

Is antimalware software required on VDI thin clients?

Is antimalware software required on VDI thin clients?

Thin clients are one useful option for VDI access. Some of these devices don’t require antimalware software, as they are secure enough by their own.

But some others require extra protection in order to assure data and users security. One example are repurposed PCs as thin clients, since although they are not usually configured to run software locally, they are tecnically vulnerable to different types of malware.

VM clones and templates best use cases

VM clones and templates best use cases

Cloning a virtual machine (VM) and creating a VM template are similar processes, since both make it easier to build and deploy VMs, but they serve different purposes in a virtual desktops infrastructure.

A VM clone is a VM copy performed at a specific time, an exact copy of the latest saved version, with the same configuration settings and identifiers. This may cause interoperability issues. Each clone can be modified as needed while the original VM keeps the same, so new changes or new copies can be made.

Deploying a Docker cluster with OpenStack Heat

Deploying a Docker cluster with OpenStack Heat

OpenStack and Docker are two complementary technologies very useful for IT administrators in traditional data centers.

In this post we tell you how to deploy a Docker cluster capable of using external storage provided byOpenStack Cinder.

The deployment of clusters is usually performed through OpenStack Magnum, which leverages Heat templates. But, how can we ensure Magma deploys and configures container infrastructure inclusive of providing external storage support for containers.?

How to setup virtual network interfaces in Linux

How to setup virtual network interfaces in Linux

Linux allows to assign more than one IP address to a single physical network interface. That’s a really useful technique, e.g. when working with Apache and virtual servers, as it enables to access the same Apache server using two different IP addresses.

Creating a virtual network interface in Linux is quite easy, here’s a comprehensive tutorial describing all the steps you should follow: Linuxconfig.org

Skip to content