How to learn tips and tricks - Page 6
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Learn how to audit permissions on your Linux system using the find command with the -perm option - along with four bonus permissions auditing methods - in this RedHat tutorial.
There are various commands available to Linux users for troubleshooting desktop and server logs. Learn the basics of the journalctl utility of Systemd and its commands that can be used to view and analyze Systemd Logs in this DebugPoint.com guide.
Running Pi-hole is an excellent way to secure devices on your local network against unwanted content. Pi-hole was initially designed to run on a Raspberry Pi, but can be deployed as a container as well. Learn how to run Pi-hole as a container with Podman in this tutorial.
Every user is a privileged user and every system is a privileged system. Thus, all types of systems require privilege security controls. However, the reality is that Unix and Linux are too often left out of modern PAM programs. Learn how to incorporate Unix/Linux in your privilege management strategy.
Learn how to use Nginx to redirect all traffic from http to the more secure https in this LinuxConfig.org tutorial.
Learn about SELinux denial messages, where they're logged, and how to parse them in a brief RedHat tutorial.
Don’t toss your old Windows laptop — give it a new OS! In the words of security expert Steven Vaughan-Nichols: "Desktop Linux can run on your Windows 7 (and older) laptops and desktops. Machines that would bend and break under the load of Windows 10 will run like a charm. And today’s desktop Linux distributions are as easy to use as Windows or macOS."
AWS CloudWatch is a useful monitoring service provided by the AWS cloud. It provides default monitoring for server parameters like CPU Utilization, Network In, Network Out, etc. Learn how to send Linux application logs to AWS CloudWatch in this HowtoForge tutorial.
Passwords are the keystone to account security. Learn how to reset passwords, set password expiration periods, and enforce password changes on your Linux network in this How-To Geek tutorial.
In this tutorial, Jack Wallen demonstrates how to easily add a new user with admin privileges on Linux.
This tutorial examines the flexibility that Booleans offer SELinux and how to make use of them.
Learn how to install the dnscrypt proxy application with an adblocker/malware blocker on Linux with WireGuard or OpenVPN in this nixCraft tutorial.
Kubernetes is hot in the DevOps space - mainly due to the open-source platform's portability and scalability. However, misconfigurations are the biggest risk for cloud environments—and Kubernetes is no exception. Learn how to secure Kubernetes clusters in this Container Journal tutorial.
Rescue and emergency modes enable Linux admins to troubleshoot and fix problems, usually making it possible to boot in standard mode afterwards. This tutorial explains how to use rescue and emergency modes in Linux Mint 20 and Ubuntu 20.04.
Security is a balance between accessibility, usability, and restriction - too far in any of those directions, and you're in for trouble. Here are some tips on how to strike that balance with your Linux system.
Learn how the tar command can help you create and manage backups smartly and easily in this quick, informative tutorial.
Want to gain a better understanding of root inside and outside of Podman containers and how user namespaces work? If so, you'll want to check out this informative two-part video series.
Learn how to set up automatic rebootless kernel updates using the live patching solutions from Canonical and CloudLinux in this 3-minute tutorial.
Containers are no more secure than physical machines. Find out how to scan your containers for vulnerabilities with the oscap-podman utility, available in Red Hat Enterprise Linux (RHEL) 8.2.
How to build a secure Docker image? The biggest goal of this article, is to be a comprehensive guide on building and delivering secure and safe container images.