Linux Learn Tips and Tricks - Page 3
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
LibreOffice is a powerful and feature-rich office suite that provides essential tools for word processing, spreadsheets, presentations, databases, and more. With regular updates, LibreOffice ensures that users have access to the latest features, bug fixes, and security patches.
Did you know attackers can modify the scripts packaged in a DEB file to gain unauthorized access to your PC? Here's how DEB packages are backdoored.
If you're hosting a Samba server, it's important that you pay extra attention to securing the server from adversaries.
Alpine Linux is a lightweight, security-based Linux operating system. It doesn’t use the GNU C Library and instead uses Musl Libc. As a result, it is lightning-fast and perfect for headless servers, embedded systems, and desktop/laptop workstations that require a low footprint. Here’s how to install Alpine Linux on your system.
If you're an ethical hacker, gathering information about the subdomains of a website is important. Here are some free Linux tools that will help you.
In this How to Make Tech Work tutorial, Jack Wallen shows how to add another layer of security to your Linux machines with just two files.
In Linux systems, including Debian 12, the sudo group grants users the ability to execute administrative commands. This provides them with the privileges to install, update, and delete software, modify system configurations, and more.
If you think your Linux server might be affected by PwnKit vulnerability CVE-2021-4034, you should immediately patch it to prevent any mishaps.
The sudo command is a very important command on Linux systems. You might say that it allows users to run privileged commands without logging in as root, and that is true.
Here's how you can install Elasticsearch, a powerful search and analytics engine on your Ubuntu machine.
In Debian, managing user privileges and administrative access is crucial for maintaining a secure and efficient system. By granting users the ability to execute administrative tasks without relying on the root account, you can enhance security, control access to sensitive operations, and maintain an audit trail of user activity.
In the client-server architecture used by the SSH protocol, a client can authenticate by providing a tunneled clear text password or by using a public/private key pair: this is called public key authentication. A user who logs in via a public key on a remote machine has complete access to the command line; in certain situations, however, it may be useful to associate a public key to a single specific command, for security reasons.
Ever tried to execute a command on your Linux system and received a “Permission Denied” error? The simplest solution to counter this error is using the “sudo” command.
Sudo stands for "superuser do" and effectively gives a regular user access to administrator-like powers. Here's how to use this powerful tool.
Reduce the chances of hackers gaining access to your Linux servers by installing and configuring Fail2ban.
If you are a system administrator and are looking for ways to make your Linux system more secure or want to automate certain processes, creating a non-login user is the solution. Non-login users can prove to be very useful for a variety of cases right from limiting access to your Linux system to running specific processes with restricted privileges. Here, we will guide you through the steps to create a non-login user in Linux and set the appropriate permissions for them.
SSH is a globally-used protocol used to access remote servers. Here's how you can strengthen your SSH connections on Linux for maximum security.
File restoration utilities are one of the most important programs in a Linux administrator’s toolkit. They provide the ability to recover deleted files, even in cases where the disk is either physically damaged or wiped clean.
SELinux is a robust and customizable security system that is shipped by default on many Linux operating systems, such as Fedora and RHEL. If you would like to add extra security to your Ubuntu server, follow along as we show you how to secure your Ubuntu Linux server with SELinux.
A look at the process to get insight into supported system calls and features and to assess how secure a system is and its runtime activity.