Home Search
lin - search results
If you're not happy with the results, please do another search
How to configure your CA trust list in Linux
Add and delete certificate authorities (CAs) from your default trust list to grant networking permissions on a case-by-case basis.
Read More at Enable Sysadmin
Manage containers at the edge with Linux
Using systemd and Podman delivers the lightweight container management capabilities required in edge environments.
Read More at Enable Sysadmin
How to onboard edge devices at scale with FDO and Linux
Learn how to use the Linux Foundation-backed FIDO Device Onboard (FDO) specification to configure edge and IoT servers and devices.
Read More at Enable Sysadmin
Automate network testing with this open source Linux tool
Use iperf3 to troubleshoot bandwidth, timing, protocol, and other problems on your TCP/IP network.
Read More at Enable Sysadmin
Contribute to Linux by joining Fedora Test Days
Linux is open source, which means anyone can help improve it. Here's how you can help test the latest Fedora Linux kernel by participating...
How to connect to a remote computer using VNC in Linux
Configure your system for screen sharing using Virtual Network Computing (VNC) in GNOME Connections and troubleshoot when things go wrong.
Read More at Enable Sysadmin
Running Kubernetes in systemd with Podman, displaying friendlier Linux man pages, and more sysadmin...
Check out Enable Sysadmin's top 10 articles from August 2022.
Read More at Enable Sysadmin
Drop man pages for this Linux command
The Linux cheat command lets you look up common command-line flags and arguments quickly without leaving the CLI.
Read More at Enable Sysadmin
Is it time for an OSPO in your organization? – Linux Foundation
Is your organization consuming open source software, or is it starting to contribute to open source projects? If so, perhaps it’s time for you to start an OSPO: an open source program office.
35 Podcasts Recommended by People You Can Trust – Linux Foundation
Because of my position as Executive Producer and host of The Untold Stories of Open Source, I frequently get asked, “What podcasts do you listen to when you’re not producing your own.” Interesting question. However, my personal preference, This American Life, is more about how they create their shows, how they use sound and music to supplement the narration, and just in general, how Ira Glass does what he does. Only podcast geeks would be interested in that, so I reached out to my friends in the tech industry to ask them what THEY listen to.
The most surprising thing I learned was people professing to not listen to podcasts. “I don’t listen to podcasts, but if I had to choose one…”, kept popping up. The second thing was people in the industry need a break and use podcasts to escape from the mayhem of their day. I like the way Jennifer says it best, “Since much of my role is getting developers on board with security actions, I gravitate toward more psychology based podcasts – Adam Grant’s is amazing (it’s called WorkLife).”
Now that I think of it, same here. This American Life. Revisionist History. Radio Lab. The Moth. You get the picture. Escaping from the mayhem of the day.
Without further digression, here are the podcasts recommended by the people I trust, no particular order. No favoritism.
The Haunted Hacker
Hosted by Mike Jones and Mike LeBlanc
Mike Jones and Mike LeBlanc built the H4unt3d Hacker podcast and group from a really grass roots point of view. The idea was spawned over a glass of bourbon on the top of a mountain. The group consists of members from around the globe and from various walks of life, religions, backgrounds and is all inclusive. They pride themselves in giving back and helping people understand the cybersecurity industry and navigate through the various challenges one faces when they decide cybersecurity is where they belong.
“I think he strikes a great balance between newbie/expert, current events and all purpose security and it has a nice vibe” – Alan Shimel, CEO, Founder, TechStrong Group
Risky Biz Security Podcast