Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we explore Rocky Linux, why it is starting to become a good choice for enterprises, and how to get an image running on a virtual machine. 

We also provide an introduction to log files, log file analysis, and log file analysis tools and techniques for both novice and advanced users. Finally, we talk about configuring the Linux firewall with the firewall-cmd command.

Interested in learning about how to manage encrypted Linux devices across the entire organization? Join Garry McCracken CISSP, VP of Technology & CISO, WinMagic and Dave Wreski, Linux security expert and CEO of Guardian Digital for a webinar on Enterprise Linux Encryption Management for Businesses Wednesday October 12th at 2 PM EST. Get Your Spot Now!

Yours in Open Source,

Brittany Signature 150

1.Penguin LandscapeIn this guide, we explore Rocky Linux, why it is starting to become a good choice for enterprises, and how to get an image running on a virtual machine. 

Learn more about official guide on rocky linux how to install it

Linux Log Analysis

19.Laptop BedThis article will serve as an introduction to log files, log file analysis, and log file analysis tools and techniques for both novice and advanced users.      

Learn more about linux log analysis

13.Lock StylizedMotherboardIn this article, we talk about configuring the Linux firewall with the firewall-cmd command.

Learn more about does linux need a firewall how to configure the linux firewall with firewall cmd