Linux 101: How to copy files and directories from the command line

Jack Wallen continues his Linux 101 series, with an introduction on how to copy files and directories from the command line.

Are you new to Linux? If so, you’ve probably found the command line can be a bit intimidating. Don’t worry–it is for everyone at the beginning. That’s why I’m here to guide you through the process, and today I’m going to show you how to copy files and folders from the command line. 

Why would you need to copy files and folders this way? You might find yourself on a GUI-less Linux server and need to make a backup of a configuration file or copy a data directory. 

Trust me, at some point you’re going to need to be able to do this. Let’s find out how. 

SEE: Linux: The 7 best distributions for new users (free PDF) (TechRepublic)

First we’ll copy a file. Let’s say you’re about to

Read more

Bosses are using monitoring software to keep tabs on working at home. Privacy rules aren’t keeping up

Worker’s union Prospect warned that the UK was at risk of ‘sleepwalking into a world of surveillance’ as more businesses turn to digital tools to keep tabs on remote workers.

The use of remote-monitoring software increased in 2020 as people began working from home.

Image: scyther5

The UK government is facing calls to urgently update guidance on workplace practices following an increase in the use of remote-monitoring technologies by businesses.

The UK Labour Party, alongside worker’s union Prospect, are campaigning for swift changes to the Code of Employment Practices published by the Informational Commissioner’s Office (ICO), arguing that new employees require new rights around how their data is collected and processed by employers.

SEE: Identity theft protection policy (TechRepublic Premium)

It comes following research by Prospect in December last year that suggested as many as one in five businesses are now tracking employees online via digital surveillance tools, or otherwise

Read more

How to use EOMONTH() to return the last day of the month and more in Excel

There’s more to EOMONTH() in Microsoft Excel than the last day of the month. Learn how to put it to use in your spreadsheets.

Image: Rawpixel/iStockphoto

Dates play a part in many spreadsheets, but they can be a bit mysterious, especially when Excel doesn’t offer a date function that returns exactly the value you need. Fortunately, the more you know, the easier dates are to work with. In this article, I’ll show you a date function that returns the last day of a specified month, and then some. It’s the “then some” that really comes in handy. Even if you don’t need this function now, it’s good to know about it when you finally do. 

SEE: 69 Excel tips every user should master (TechRepublic)

I’m using Microsoft 365 on a Windows 10 64-bit system, but you can use an earlier version. You can work with your own data or download

Read more

The aftermath of the SolarWinds breach: Organizations need to be more vigilant

Security experts say organizations are, and should, implement a number of changes ranging from how they vet vendors to handling application updates.

Image: Getty Images/iStockphoto

The way Nick Fuchs sees it, in the aftermath of the massive SolarWinds breach, there has been one silver lining: A greater understanding of the important role security needs to play in any organization. Not only is there an “obvious opportunity to learn from the event,” but also an awareness “around the importance of prioritizing security fundamentals that penetrates all levels of the organization,” said Fuchs, senior director of infrastructure, security, support, and controls at Springfield Clinic.

While that may slow the process for IT to onboard a new application, for example, Fuchs says it enables security professionals to reference this cautionary tale of what happens when the appropriate processes are not in place.

Fuchs and others said the breach is prompting organizations to

Read more

Developers: How observability complements the future of monitoring

Commentary: Those who say observability killed monitoring aren’t paying attention. Here’s why.

Image: monstArrr_, Getty Images/iStockphoto

You can be forgiven if you thought monitoring was passé. Nagios, for example, is probably the best known of the open source monitoring tools, but interest in it has steadily declined for over a decade. Meanwhile, observability tools like OpenTelemetry are hot, though “observability” is arguably a cool new term for much the same metrics, logs, and traces that we’ve been analyzing long before the term was coined. 

Indeed, as Lightstep CEO Ben Sigelman has argued, observability isn’t going to replace monitoring “because it shouldn’t.” Observability is all about augmenting monitoring, not replacing it. Here’s why.

SEE: Editorial calendar: IT policies, checklists, toolkits, and research for download (TechRepublic Premium)

Thinking differently about monitoring

Must-read developer content

I suggested above that observability is really just a fancy way of saying “logs, traces, and

Read more

How to check if someone else accessed your Google account

Review your recent Gmail access, browser sign-in history, and Google account activity to make sure no one other than you has used your account.

Illustration: Andy Wolber/TechRepublic

What’s Hot at TechRepublic

Whenever a computer is out of your direct view and control, there’s always a chance that someone other than you can gain access. A person who returns from a trip might wonder if their computer and accounts have been accessed during their absence. A person might notice odd activity in Gmail, not aware that their password has been made public (or “pwned“). Or, in some cases, a person might be surveilled by a partner, a family member, a colleague, or even an unknown party.

To secure an account, you might first change your password, enable two-factor authentication, or even enroll in Google’s Advanced Protection Program. Those steps will help you secure your account. However,

Read more