How to: Harden My Filesystem in Linux
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Kernel SMB Daemon (KSMBD) has become essential for file sharing and data management within Linux ecosystems, becoming increasingly prominent as network security demands grow. KSMBD is an SMB server module created for maximum performance and compatibility across various operating systems, making file sharing effortless.
GnuPG, an open-source tool created to enhance security on Linux systems and other platforms, has become an essential component of our security toolbox as admins. But what exactly is GnuPG, and why should administrators consider it an integral component? I'll answer these questions and then explain how to install GnuPG and encrypt and decrypt files with this powerful tool!
FTP (File Transfer Protocol) remains an invaluable component of the business technology landscape for those not quite adept at running an entire build system. While going full cloud may seem appealing, think twice if any files that contain sensitive information need to be uploaded and downloaded through third-party services without your control.
In today's interconnected world, controlling who has access to and can modify files is important. Understanding file permissions, whether you're a system administrator or developer, is essential to ensuring the security and management of your data.
Linux offers over 1,000 commands for a simple service. This number increases when you move to the desktop. In Pop!_OS, for example, /usr/bin has 1,615 commands, and /usr/sbin has 609. There are more than 2,000 commands available.
Linux deletes directories and files using the rm Linux command. You need to know what will happen when you press "Enter" to use this tool in a safe manner. Here's what you need to understand to use the rm Linux command securely and effectively.
Linux file permissions enable you to allow or prevent other users from viewing your files, making them crucial to robust security and privacy. But how can you change file and folder permissions on Linux from the Command Line to improve the security of your filesystem?
Today we'll cover how to encrypt and securely transfer files using GPG. GPG is a free, open-source encryption program that uses public-key cryptography, which means you can send encrypted files without ever having to send your private key over email or any other insecure channel. The only way to decrypt the file is if you have both your public and private keys, which means even if someone were able to intercept and read the message before it reached its intended recipient, it would be useless without the private key.
Linux has different security permissions, each impacting what can be done with a file and a directory.
Backups are the backbone of an organization. One of the efficient way to back up your files is to use the Rsync utility. Rsync is a powerful tool for efficiently transferring files between computers over a network.
Welcome to the world of Linux, where downloading files is a vital part of everyday tasks. Whether you’re a Linux enthusiast or a casual user, knowing how to download files efficiently is essential for your productivity. In this article, we will explore various methods and commands that you can use to download files in Linux.
As you learn Ubuntu, you find that you need to change the ownership of a folder or even its subfolders. Why is this important? Whether you’re an administrator managing multi-user environments or a regular user consolidating data, changing folder ownership can serve several key purposes.
Looking for the easiest method for protecting a file behind a layer of encryption in Linux? Here are two easy ways.
The contents of the /etc/group file can seem cryptic at first. But all it contains is information on locally configured groups on a Linux system.
Suppose you want to transfer some files between servers on a Linux system. There are many ways you can accomplish the task, but if your priority is to transfer files securely, you’re left with a few options.
It's easy to secure the contents of a text file on Linux by encrypting it with Vim.
There’s a lot more to working with files on Linux than creating, listing and updating them. After all, files can be Linux commands (i.e., binaries), scripts, images, simple text files, pointers to other files or folders. You might remember the "everything is a file" description of Unix and Linux systems.
Tomb is a simple shell script that allows you to encrypt files in Linux. Unlike full disk encryption, Tomb enables you to only include the files and folders that you want to encrypt. Here we show you how to install and use Tomb on Ubuntu.
File transfer over a network can be done in various ways and using different protocols. The most commonly used protocols for copying files remotely are Rsync, SCP and SFTP.
The Linux rsync command is a powerful file copying and folder synchronization tool. Here are ten common use-cases that you’ll be able to put to good use on your own systems.