How to learn tips and tricks - Page 6

Find the HOWTO or step-by-step guide that you need right here.

 

Discover How To Learn Tips And Tricks HOWTOs

RUN PI-HOLE AS A CONTAINER WITH PODMAN

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Running Pi-hole is an excellent way to secure devices on your local network against unwanted content. Pi-hole was initially designed to run on a Raspberry Pi, but can be deployed as a container as well. Learn how to run Pi-hole as a container with Podman in this tutorial.

How to switch an old Windows laptop to Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Don’t toss your old Windows laptop — give it a new OS! In the words of security expert Steven Vaughan-Nichols: "Desktop Linux can run on your Windows 7 (and older) laptops and desktops. Machines that would bend and break under the load of Windows 10 will run like a charm. And today’s desktop Linux distributions are as easy to use as Windows or macOS."

How to send Linux application logs to AWS CloudWatch

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

AWS CloudWatch is a useful monitoring service provided by the AWS cloud. It provides default monitoring for server parameters like CPU Utilization, Network In, Network Out, etc. Learn how to send Linux application logs to AWS CloudWatch in this HowtoForge tutorial.

How to Secure Your Kubernetes Cluster

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Kubernetes is hot in the DevOps space - mainly due to the open-source platform's portability and scalability. However, misconfigurations are the biggest risk for cloud environments—and Kubernetes is no exception. Learn how to secure Kubernetes clusters in this Container Journal tutorial.

Balancing Linux Security with Usability

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security is a balance between accessibility, usability, and restriction - too far in any of those directions, and you're in for trouble. Here are some tips on how to strike that balance with your Linux system.

Rootless containers using Podman

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Want to gain a better understanding of root inside and outside of Podman containers and how user namespaces work? If so, you'll want to check out this informative two-part video series.

On container image security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

How to build a secure Docker image? The biggest goal of this article, is to be a comprehensive guide on building and delivering secure and safe container images.