How to learn tips and tricks - Page 5
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Linux gives you hundreds of different options to choose from. But are there any factors you should keep in mind when selecting a Linux distro?
SELinux can help you secure your server from malfunctioning processes or applications. Developed by the NSA (National Security Agency) to secure government devices from attackers, the security enhanced (SE) Linux architecture uses security protocols to restrict access to system resources. Find out how you can use it for your own server.
Setting up a Gemini server of your own is rather easy with Linux and a Raspberry Pi.
Improve your initial impression of Linux by learning more about the most common mistakes new users make.
Here's everything you need to know about masked services in Linux.
Learn how to add the repository to install AnyDesk on Oracle Linux 8 for connecting and assisting remote systems with the help of the internet.
Nextcloud is a powerful productivity platform that gives you access to some amazing features, such as collaborative editing, cloud file sync, private audio/video chat, email, calendar, and more! Best of all, Nextcloud is under your control and is completely customizable. In this article, we're going to be setting up our very own Nextcloud server on Linode.
Here are five tips for securing Linux that you can take care of in 5 minutes or less.
Dear nixCraft, I carry my Linux powered laptop just about everywhere. How do I protect my private data stored on partition or removable storage media against bare-metal attacks where anyone can get their hands on my laptop or usb pen drive while traveling?
SSH is a globally-used protocol used to access remote servers. Here's how you can strengthen your SSH connections on Linux for maximum security.
If you ever need to securely connect to a remote machine and reach a command-line interface, SSH is the tool for the job. The Secure Shell Protocol (SSH) has been used for decades as a means to remotely interface with Unix / Linux / BSD machines over insecure connections.
Whether you are a Sysadmin, Developer, DevOps, Security, or Ops … effectively using Linux and its tooling is the most fundamental skill you can learn. Linux is the backbone of the majority of servers and applications around the world.
This article is a complete guide on using the DNF command in Linux to manage and maintain the software package base.
Learn how to use ssh-keygen to create new key pairs, copy host keys, use a single login key pair for multiple hosts, retrieve key fingerprints and more in this tutorial.
NFS is one of the easiest and most transparent ways to handle shared storage within an organization. Learn how to configure it on Red Hat Enterprise Linux.
Interrupting the boot process is useful for troubleshooting and maintenance, but make sure you enable full disk encryption first.
Swap your old Linux commands for new and improved alternatives that provide the same functionality, if not more.
Linux kernel 5.18 is here and users of Ubuntu and Ubuntu-based distributions can now install it if they need support for their hardware or just want to use some of its new features and enhancements.
The scp command makes copying files between Linux computers easy and secure. It uses SSH security, but best of all, it is simple. If you can use cp, you can use scp.
Setting up a system snapshot utility like Timeshift will make restoring your Linux system to any previous state a lot easier for you. Here's how this can be done.