How To Harden My Filesystem
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Linux offers over 1,000 commands for a simple service. This number increases when you move to the desktop. In Pop!_OS, for example, /usr/bin has 1,615 commands, and /usr/sbin has 609. There are more than 2,000 commands available.
Linux deletes directories and files using the rm Linux command. You need to know what will happen when you press "Enter" to use this tool in a safe manner. Here's what you need to understand to use the rm Linux command securely and effectively.
Linux file permissions enable you to allow or prevent other users from viewing your files, making them crucial to robust security and privacy. But how can you change file and folder permissions on Linux from the Command Line to improve the security of your filesystem?
Today we'll cover how to encrypt and securely transfer files using GPG. GPG is a free, open-source encryption program that uses public-key cryptography, which means you can send encrypted files without ever having to send your private key over email or any other insecure channel. The only way to decrypt the file is if you have both your public and private keys, which means even if someone were able to intercept and read the message before it reached its intended recipient, it would be useless without the private key.
Linux has different security permissions, each impacting what can be done with a file and a directory.
Backups are the backbone of an organization. One of the efficient way to back up your files is to use the Rsync utility. Rsync is a powerful tool for efficiently transferring files between computers over a network.
Welcome to the world of Linux, where downloading files is a vital part of everyday tasks. Whether you’re a Linux enthusiast or a casual user, knowing how to download files efficiently is essential for your productivity. In this article, we will explore various methods and commands that you can use to download files in Linux.
As you learn Ubuntu, you find that you need to change the ownership of a folder or even its subfolders. Why is this important? Whether you’re an administrator managing multi-user environments or a regular user consolidating data, changing folder ownership can serve several key purposes.
Looking for the easiest method for protecting a file behind a layer of encryption in Linux? Here are two easy ways.
The contents of the /etc/group file can seem cryptic at first. But all it contains is information on locally configured groups on a Linux system.
Suppose you want to transfer some files between servers on a Linux system. There are many ways you can accomplish the task, but if your priority is to transfer files securely, you’re left with a few options.
It's easy to secure the contents of a text file on Linux by encrypting it with Vim.
There’s a lot more to working with files on Linux than creating, listing and updating them. After all, files can be Linux commands (i.e., binaries), scripts, images, simple text files, pointers to other files or folders. You might remember the "everything is a file" description of Unix and Linux systems.
Tomb is a simple shell script that allows you to encrypt files in Linux. Unlike full disk encryption, Tomb enables you to only include the files and folders that you want to encrypt. Here we show you how to install and use Tomb on Ubuntu.
File transfer over a network can be done in various ways and using different protocols. The most commonly used protocols for copying files remotely are Rsync, SCP and SFTP.
The Linux rsync command is a powerful file copying and folder synchronization tool. Here are ten common use-cases that you’ll be able to put to good use on your own systems.
The people who can use the Linux sudo command are members of a small and select club, sometimes called the “sudoers” list. Each member has the same powers as root. So how do you join that club? We’ll walk through adding a person to sudoers as well as editing the sudoers file to limit permissions.
File permissions are critical for the security of a Linux system. But how do you set default permissions for new files on Linux?
Chroot is a Linux/Unix utility that can change or modify the root filesystem. With the help of the chroot command, you can easily create an isolated filesystem inside your primary filesystem. Chroot is especially helpful to make your work and home environment separated or if you want a test environment to test software in isolation.
In Linux, all directories and files have access permissions. You can use chmod to set your preferred access rights for different users. But what decides their default permissions? Let’s talk about umask.