Wed 13 February, 2019

Sitting in the Linux Cockpit

2019-02-13T17:25:10+00:00Wed 13 February, 2019|Tags: , |

If you haven't tried the relatively new Linux Cockpit, you might be surprised by all it can do. It's a user-friendly web-based console that provides some very easy ways to administer Linux systems — through the web. You can monitor system resources, add or remove accounts, monitor system u..

Mon 11 February, 2019

Red Hat announces container flaw CVE-2019-5736

2019-02-12T00:45:28+00:00Mon 11 February, 2019|Tags: , |

Red Hat announced a vulnerability this morning – one that can be exploited if a user runs malicious or modified containers. The flaw in runC (a lightweight portable container runtime) and Docker that this vulnerability exposes allows an attacker to escape a container and access the underlying file s..

Thu 7 February, 2019

How much memory is installed and being used on your Linux systems?

2019-02-07T22:36:20+00:00Thu 7 February, 2019|Tags: |

There are numerous ways to get information on the memory installed on Linux systems and view how much of that memory is being used. Some commands provide an overwhelming amount of detail, while others provide succinct, though not necessarily easy-to-digest, answers. In this post, we'll look at ..

Tue 5 February, 2019

The Linux command-line cheat sheet

2019-02-06T05:57:55+00:00Tue 5 February, 2019|Tags: |

When coming up to speed as a Linux user, it helps to have a cheat sheet that can help introduce you to some of the more useful commands. In the tables below, you’ll find sets of commands with simple explanations and usage examples that might help you or Linux users you support become more productive..

Wed 23 January, 2019

How to monitor activity on your Linux server

2019-01-24T05:45:51+00:00Wed 23 January, 2019|Tags: , , |

Linux systems provide a number of commands that make it easy to report on system activity. In this post, we're going to look at several commands that are especially helpful. The watch commandThe watch command is one that makes it easy to repeatedly examine a variety of data on your system — use..

Fri 18 January, 2019

SUSE releases enterprise Linux for all major ARM processors

2019-01-19T06:54:39+00:00Fri 18 January, 2019|Tags: |

SUSE has released its enterprise Linux distribution, SUSE Linux Enterprise Server (SLES), for all major ARM server processors. It also announced the general availability of SUSE Manager Lifecycle. SUSE is on par with the other major enterprise Linux distributions — Red Hat and Ubuntu — in the x86 sp..

Fri 18 January, 2019

Linux systems: Scraping up information about apt updates

2019-01-19T06:54:39+00:00Fri 18 January, 2019|Tags: |

When you use the apt command to install new packages or run routine upgrades on your Debian-based Linux system, you might wonder where information about your activities are being recorded. For one, your history file probably retains information on the commands that you use, though history files like..

Wed 16 January, 2019

Zipping files on Linux: the many variations and how to use them

2019-01-16T21:16:52+00:00Wed 16 January, 2019|Tags: |

Some of us have been zipping files on Unix and Linux systems for many decades — to save some disk space and package files together for archiving. Even so, there are some interesting variations on zipping that not all of us have tried. So, in this post, we’re going to look at standard zipping and unz..

Sat 12 January, 2019

First step to becoming a hacker: Linux!

2019-01-13T00:07:12+00:00Sat 12 January, 2019|Tags: , |

If you're contemplating a career in cybersecurity and haven't come up to speed on Linux, now's the time to get ramped up and here's one easy way to do it. This new book from no starch press was written with people like you in mind. Authored by OccupyTheWeb, the force behind Hacke..

Tue 8 January, 2019

How ASLR protects Linux systems from buffer overflow attacks

2019-01-08T21:31:45+00:00Tue 8 January, 2019|Tags: , |

Address Space Layout Randomization (ASLR) is a memory-protection process for operating systems that guards against buffer-overflow attacks. It helps to ensure that the memory addresses associated with running processes on systems are not predictable, thus flaws or vulnerabilities associated with the..