This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
There are many types of files on Linux systems and numerous ways to look at them, from listing permissions to viewing content. Permissions and ownership Listing files on Linux with the ls -l command provides information on the file’s owner and associated group. You just need to pick the right command to get the information you need.
If you're not sure how to view your SSH certificates, this article walks you through the steps on Linux, macOS and Windows. The post How to View Your SSH Keys in Linux, macOS and Windows appeared first on TechRepublic.
Fail2ban should be on every one of your Linux servers. If you've yet to install it on either Rocky Linux or AlmaLinux, Jack Wallen is here to help you out with that.
New Linux admins need to know how to give and take sudo privileges from users. Jack Wallen shows you how on both Ubuntu- and Red Hat-based Linux distributions.
Learn how to protect your Linux server from the fork bomb denial-of-service attack with this video tutorial by Jack Wallen. The post How to prevent fork bombs on your Linux development servers appeared first on TechRepublic.
A challenge for enterprises that operate large-scale network infrastructure has long been how to maintain performance while updating critical systems. The Linux Foundations networking division (LF Networking) is helping to address that challenge with the L3AF project, which is based on eBPF (extended Berkeley Packet Filter ) technology.
There are several ways to loop “forever” on Linux commands. This post provides some examples of how to do this. In practice, this means only until you decide to stop looping. You might do this while typing commands on the command line, or, more likely, within your scripts. It’s quite easy.
Looking for an easy to use encryption tool to protect data on your Linux servers? Jack Wallen shows you how to install and use gocryptfs to serve that very purpose.
There are quite a few tools that can help test your connectivity on the Linux command line. ping statistics 3 packets transmitted, 3 received, 0% packet loss, time 2003ms rtt min/avg/max/mdev = 2.867/4.361/5.859/1.221 ms On Linux systems, the pings will continue until you type^cto stop them. ping 192.168.0.11 ms ^C 192.168.0.11
With Webmin, you can better secure and manage your instances of Rocky Linux. Jack Wallen walks you through the process of getting this web-based tool up and running.
There are quite a few ways to extract words and substrings from lines of text on a Linux system, replace them with other strings, select delimiters, and even get rid of white space at the beginning and end of lines. set -- 01234567890abcdef $ echo $1 01234567890abcdef Wrap-up Linux provides many commands to help you manipulate text.
Jack Wallen installed 1Password on Linux and found it to be a fantastic solution for password management. Follow his tutorial on how to get this proprietary solution installed on your open source OS.
If you've had files deleted by a hacker or you've accidentally removed them, Jack Wallen shows you how to recover that missing data with a handy tool called testdisk.
A new Linux version of Royal ransomware is targeting VMware ESXi virtual machines. Learn more about this security threat and how to protect from it. The post Royal ransomware spreads to Linux and VMware ESXi appeared first on TechRepublic.
Learn tips on how you can use the Linux openssl command to find critical certificate details. SSL certificates are an integral component in securing data and connectivity to other systems.
If you work on headless Linux servers, you might want to have a command-line password storage tool. Jack Wallen shows you how to use GnuPG and pass for this purpose. The post How to safely store passwords on a Linux server appeared first on TechRepublic.
It’s not just knowing how to set up and maintain your servers and understanding how system commands work that makes you a good system administrator. I spent more than 30 years managing Linux servers. Rule 17: Never stop picking up new skills Managing Linux servers can be a very time-consuming and demanding task.
Deploying password-quality checking on your Debian-based Linux servers can help ensure that your users assign reasonably secure passwords to their accounts, but the settings themselves can be a bit misleading.
Jack Wallen shows you how to install this platform on Rocky Linux. If you're looking for one of the best vulnerability scanners on the market, Nessus might be the ticket.
The Linux find command makes it easy to find files on your system – even if you don’t remember their names or exactly when you last updated them. name TheEnd -delete Wrap-up There really are a lot of very useful options to help you find files on your Linux system – so many, in fact, that it may take a while to digest them all!
Looking to eke out as much security as you can from your Linux servers? Jack Wallen shows you how you can limit the information would-be ne'er-do-wells get by disabling the login banner.
Find out how to mount a remote directory on a Rocky Linux server to a local directory with the help of SSHFS. The post How to use SSHFS to mount remote directories on Rocky Linux appeared first on TechRepublic.
The rm (remove) command is the most obvious way to remove files that you no longer need on your Linux system, and it includes some very useful options. The rm command The rm command simply removes a file and is one of the basic commands that just about every Linux user needs on a routine basis. There are complications, however.
If you've had files deleted by a hacker or you've accidentally removed them, Jack Wallen shows you how to recover that missing data with a handy tool called testdisk.
To keep your Linux servers and desktops as secure as possible, you should check for (and remove) legacy communication services. Jack Wallen shows you how.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content