How to learn tips and tricks
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Learn how to fix a broken or unusable Ubuntu OS without having to resort to the option of reinstalling Ubuntu and losing all of your files and applications in this Tecmint tutorial.
Knowing how to list and check the status of running services is essential when debugging system issues. Learn how to list and manage Linux services using the Systemctl utility in this Linuxize tutorial.
Without the right tools and processes in place, Docker security can feel like a moving target. Learn four best practices for keeping deployments safe in this helpful TechTarget tutorial.
Piping Server is a free web service used to share data between devices over HTTP/HTTPS. Learn how to use Piping Server to securely transfer files - both from the command line and via a web browser - in this OSTechnix guide.
Fail2ban is one of the most popular open-source tools for the banning of unwanted logins on a Linux system. In this TechRepublic tutorial, Jack Wallen demonstrates how to install and configure fail2ban on the latest release of Fedora Linux.
This guide demonstrates how to integrate the flexibility, scalability, and increased features of LVM into your server storage strategies. Traditional partitioning is good, but LVM is better - find out how.
Learn how to audit permissions on your Linux system using the find command with the -perm option - along with four bonus permissions auditing methods - in this RedHat tutorial.
There are various commands available to Linux users for troubleshooting desktop and server logs. Learn the basics of the journalctl utility of Systemd and its commands that can be used to view and analyze Systemd Logs in this DebugPoint.com guide.
Running Pi-hole is an excellent way to secure devices on your local network against unwanted content. Pi-hole was initially designed to run on a Raspberry Pi, but can be deployed as a container as well. Learn how to run Pi-hole as a container with Podman in this tutorial.
Every user is a privileged user and every system is a privileged system. Thus, all types of systems require privilege security controls. However, the reality is that Unix and Linux are too often left out of modern PAM programs. Learn how to incorporate Unix/Linux in your privilege management strategy.
Learn how to use Nginx to redirect all traffic from http to the more secure https in this LinuxConfig.org tutorial.
Learn about SELinux denial messages, where they're logged, and how to parse them in a brief RedHat tutorial.
Don’t toss your old Windows laptop — give it a new OS! In the words of security expert Steven Vaughan-Nichols: "Desktop Linux can run on your Windows 7 (and older) laptops and desktops. Machines that would bend and break under the load of Windows 10 will run like a charm. And today’s desktop Linux distributions are as easy to use as Windows or macOS."
AWS CloudWatch is a useful monitoring service provided by the AWS cloud. It provides default monitoring for server parameters like CPU Utilization, Network In, Network Out, etc. Learn how to send Linux application logs to AWS CloudWatch in this HowtoForge tutorial.
Passwords are the keystone to account security. Learn how to reset passwords, set password expiration periods, and enforce password changes on your Linux network in this How-To Geek tutorial.
In this tutorial, Jack Wallen demonstrates how to easily add a new user with admin privileges on Linux.
This tutorial examines the flexibility that Booleans offer SELinux and how to make use of them.
Learn how to install the dnscrypt proxy application with an adblocker/malware blocker on Linux with WireGuard or OpenVPN in this nixCraft tutorial.
Kubernetes is hot in the DevOps space - mainly due to the open-source platform's portability and scalability. However, misconfigurations are the biggest risk for cloud environments—and Kubernetes is no exception. Learn how to secure Kubernetes clusters in this Container Journal tutorial.
Rescue and emergency modes enable Linux admins to troubleshoot and fix problems, usually making it possible to boot in standard mode afterwards. This tutorial explains how to use rescue and emergency modes in Linux Mint 20 and Ubuntu 20.04.