How to learn tips and tricks

Find the HOWTO or step-by-step guide that you need right here.

 

Discover Government News

Discover How To Learn Tips And Tricks HOWTOs

How To Improve Linux Kernel Security for Embedded Systems

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Securing the Linux kernel in embedded systems is critically important, as these systems are widely used in various industries, ranging from IoT devices and industrial control systems to automotive and medical devices. Neglecting the security of the Linux kernel can have severe consequences, leading to potential breaches and exploits.

How To Update Signatures on Linux Endpoints with Offline Security Intelligence Update

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Microsoft has announced that Offline Security Intelligence Update is now in Public Preview. According to Microsoft, "Organizations can now update security intelligence (also referred to as “signatures”) on Linux endpoints with limited or no exposure to the internet using a local hosting server. Exercise better control over the download and deployment of signatures on their Linux servers running critical workloads."

How To Deploy Software to Linux-Based IoT Devices at Scale

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Internet of Things (IoT) has changed the way people interact with the world. It connects a wide range of devices, from smart thermostats at home to industrial sensors used in manufacturing plants. Many IoT products use Linux due to its robustness, flexibility, and open-source nature.

How To Hide Your Shell Passwords with sshpass on Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Shell scripts are an integral part of Linux but can often require passwords that shouldn't be hard-coded for security reasons. Instead, sshpass is a non-interactive tool specifically created for password automation in shell scripts. Here's how to install and use sshpass on Ubuntu-based and Fedora-based distributions to put a password in your Bash script.

Secure Remote Linux Server Logins with SSH Key Authentication

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

You will most likely use a Secure Shell (SSH). to perform remote work with Linux servers or containers. Although the name of the software includes "secure," you shouldn't assume it is locked down by default. It's certainly more secure than telnet, but you still need to do extra to ensure your data and systems are safe.

Port Knocking Ubuntu Servers (or Containers) for More Secure SSH

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

You've probably read the usual things admins do with the Secure Shell (SSH), such as changing the port, preventing root logins, using fail2ban, using SSH key authentication, etc. But there's another technique you can employ that does a great job of protecting your servers from unwanted SSH logins.

How To Create Encrypted Tunnels with SSH Port Forwarding on Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Secure Shell (SSH) is a powerful tool with many cool tricks to help make your life a bit easier. Today, we will discuss port forwarding, which can be used to: Access a server you may not have otherwise been able to. Access a remote computer with more security. Allow a temporary encrypted tunnel to be created from your local computer to a remote device. 

The Best Linux Software for Windows Switchers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As many in the infosec and sysadmin communities know, migrating from a closed-source Windows environment to the open ecosystem of Linux can be daunting. We aim to ease the transition by highlighting key categories where Linux alternatives to familiar Windows software exist.

Channeling Traffic with Nginx as a Reverse Proxy Server on Debian

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the bustling digital landscape, managing web traffic efficiently is akin to directing a riveting orchestra, with each request hitting the right note at the desired tempo. Central to this symphony is the conductor, the reverse proxy server, ensuring each request reaches its designated section, be it the strings, brass, or percussion, represented by the different servers in a network.