Home Search

lin - search results

If you're not happy with the results, please do another search

Intro to Linux Log Files and How to Manage Them with Logrotate

The first thing someone should learn when trying to debug something in Linux is finding and reading logs. Our intro to log files will...

Linkerd Project Joins the Cloud Native Computing Foundation

Today, the Cloud Native Computing Foundation’s (CNCF) Technical Oversight Committee (TOC) voted to accept Linkerd as the fifth hosted project alongside Kubernetes, Prometheus, OpenTracing...

Linux Security Threats: The 7 Classes of Attackers

Start exploring Linux Security Fundamentals by downloading the free sample chapter today. DOWNLOAD NOW Organizations today are facing a worldwide security workforce shortage -- and hurting for...

Writing SELinux Modules

SELinux struggles to cast off its image as difficult to maintain and the cause of potential application problems. Yet in recent years, much has...

How to Create a New sudo User on Ubuntu Linux Server

In Linux (and Unix in general), there is a SuperUser named root. The root user can do anything and everything, and thus doing daily...

5 Linux Desktop Environments on the Rise for 2017

With each passing year, the Linux desktop ecosystem shifts and morphs from one darling to the next. Although it’s sometimes challenging to tell, from...

This Week in Open Source News: Linux & Open Source Vulnerabilities in 2017

This week in open source news, a study from Black Duck suggests the potential for open source malware is set to skyrocket in 2017,...

How to get started with a VPN in Linux

The most popular way to circumvent censorship is with a VPN (Virtual Private Network).  As the name suggests, a virtual network allows you to connect...

Linux Is Part of the IoT Security Problem, Dev Tells Linux Conference

The Mirai botnet? Just the “tip of the iceberg” is how security bods at this week's linux.conf.au see the Internet of Things. Presenting to the...

Long-term Embedded Linux Maintenance Made Easier

The good old days when security breaches only happened to Windows folk are fading fast. Malware hackers and denial of service specialists are increasingly...