Linux Learn Tips and Tricks - Page 9
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Learn about six dangerous Linux commands you should avoid at all costs.
Linux sysadmins: learn how to use rsync compression and checksums to better manage file synchronization.
Learn how to hold or prevent a package from upgrade in Debian, Ubuntu and its derivatives such as Linux Mint and Pop!_OS in this OSTechnix tutorial.
Taking your first steps as a Linux sysadmin? Learn the OS hardening tricks you need to secure your systems in this Make Use Of tutorial.
Learn how to fix a broken or unusable Ubuntu OS without having to resort to the option of reinstalling Ubuntu and losing all of your files and applications in this Tecmint tutorial.
Knowing how to list and check the status of running services is essential when debugging system issues. Learn how to list and manage Linux services using the Systemctl utility in this Linuxize tutorial.
Without the right tools and processes in place, Docker security can feel like a moving target. Learn four best practices for keeping deployments safe in this helpful TechTarget tutorial.
Piping Server is a free web service used to share data between devices over HTTP/HTTPS. Learn how to use Piping Server to securely transfer files - both from the command line and via a web browser - in this OSTechnix guide.
Fail2ban is one of the most popular open-source tools for the banning of unwanted logins on a Linux system. In this TechRepublic tutorial, Jack Wallen demonstrates how to install and configure fail2ban on the latest release of Fedora Linux.
This guide demonstrates how to integrate the flexibility, scalability, and increased features of LVM into your server storage strategies. Traditional partitioning is good, but LVM is better - find out how.
Learn how to audit permissions on your Linux system using the find command with the -perm option - along with four bonus permissions auditing methods - in this RedHat tutorial.
There are various commands available to Linux users for troubleshooting desktop and server logs. Learn the basics of the journalctl utility of Systemd and its commands that can be used to view and analyze Systemd Logs in this DebugPoint.com guide.
Running Pi-hole is an excellent way to secure devices on your local network against unwanted content. Pi-hole was initially designed to run on a Raspberry Pi, but can be deployed as a container as well. Learn how to run Pi-hole as a container with Podman in this tutorial.
Every user is a privileged user and every system is a privileged system. Thus, all types of systems require privilege security controls. However, the reality is that Unix and Linux are too often left out of modern PAM programs. Learn how to incorporate Unix/Linux in your privilege management strategy.
Learn how to use Nginx to redirect all traffic from http to the more secure https in this LinuxConfig.org tutorial.
Learn about SELinux denial messages, where they're logged, and how to parse them in a brief RedHat tutorial.
Don’t toss your old Windows laptop — give it a new OS! In the words of security expert Steven Vaughan-Nichols: "Desktop Linux can run on your Windows 7 (and older) laptops and desktops. Machines that would bend and break under the load of Windows 10 will run like a charm. And today’s desktop Linux distributions are as easy to use as Windows or macOS."
AWS CloudWatch is a useful monitoring service provided by the AWS cloud. It provides default monitoring for server parameters like CPU Utilization, Network In, Network Out, etc. Learn how to send Linux application logs to AWS CloudWatch in this HowtoForge tutorial.
Passwords are the keystone to account security. Learn how to reset passwords, set password expiration periods, and enforce password changes on your Linux network in this How-To Geek tutorial.
In this tutorial, Jack Wallen demonstrates how to easily add a new user with admin privileges on Linux.