| by Scott Kilroy

Security Auditing for linux with Auditd

So, you have a directory full of super-secret files that only a very few people need to see, and you want to know when unauthorized people try to see them. Or, maybe you want to see when a certain file gets changed, or you want to see when people log into the system and what […]

The post Security Auditing for linux with Auditd appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Scanning for Rootkits with Rootkit Hunter

Rootkits are exceedingly nasty pieces of malware that can definitely ruin your day. They can listen for commands from their masters, steal sensitive data and send it to their masters, or provide an easy-access back door for their masters. They’re designed to be stealthy, with the ability to hide themselves from plain view Install Rootkit […]

The post Scanning for Rootkits with Rootkit Hunter appeared first on The Linux Juggernaut.

Share Button
Read More
| by Arround The Web

How to Utilize the Advanced Data Recovery Technology Available in the World

In today’s digital world, data storage devices play a very important role in our professional as well as personal lives because we store every bit of useful information on one or another data storage device. Nothing will make you feel more helpless tha…

Share Button
Read More
| by Scott Kilroy

Monitor Network Traffic with vnStat on Ubuntu 20.04

vnStat is a free, open-source and console-based network traffic monitoring tool for Linux operating system. With vnStat, you can monitor network statistics over various time periods.

Share Button
Read More
| by Scott Kilroy

Different ways to schedule and list CRON jobs in Linux

Cron is a built-in Linux utility used to run different processes within the computer system at a particular scheduled time. This tutorial will assist you through several techniques to schedule and list Cron jobs in Linux.

Share Button
Read More
| by Scott Kilroy

How to Work with Date and Time in Bash Using date Command

Date command is an external bash program that allows to set or display system date and time. It also provides several formatting options. Date command is installed in all Linux distros by default. $
The post How to Work with Date and Time in Bash Using…

Share Button
Read More
| by Scott Kilroy

Securing Linux System With Maldet

Viruses are a real problem for computers that run the Windows operating system. But, as far as anyone has been able to tell, there’s no such thing as a virus that can harm a Linux-based operating system. So, the only real reason to run an antivirus solution on a Linux machine is to prevent infecting […]

The post Securing Linux System With Maldet appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Application Sandboxing with Firejail in Linux

If you have an untrusted application that needs to be run in your Linux system, you can use a sandbox to run the application in a limited environment. In this way you can use the untrusted application without worrying about the security of your system. Sandboxing with Firejail uses namespaces, SECCOMP, and kernel capabilities to […]

The post Application Sandboxing with Firejail in Linux appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Dog – Command Line DNS Client for DNS Lookup

Dog is a nice-looking command-line DNS Client for DNS lookup which works like dig. It has colorful output, understands normal command-line argument syntax, supports the DNS-over-TLS and DNS-over-HTTPS protocols, and can emit JSON. This tutorial shows h…

Share Button
Read More
| by Arround The Web

How to Find a Budget Laptop With Good Performance

Seeking out and purchasing something like a laptop can be really daunting. Especially if you need to use this tool to complete work for your job or schoolwork, you’ll have specific requirements that need to be met. Beyond this, your hobbies like videog…

Share Button
Read More
| by Scott Kilroy

SeaGL – Seattle GNU/Linux Conference Happening This Weekend!

by Webmaster

This Friday, November 13th and Saturday, November 14th, from 9am to 4pm PST the 8th annual SeaGL will be held virtually. This year features four keynotes, and a mix of tal…

Share Button
Read More
| by Scott Kilroy

Enforcing Strong Password Criteria Using PWQUALITY

Cyber-attacks are becoming increasingly ubiquitous and difficult to deal with and Hackers relentlessly try to exploit common weak passwords. As a result, organizations have to safeguard themselves by using strong password criteria to secure their systems. In this article, we’ll take a look at the mechanics of enforcing strong password criteria on a Linux system. […]

The post Enforcing Strong Password Criteria Using PWQUALITY appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Advanced tips and tricks for using sudo

Now that we’ve looked at the basics of setting up a good sudo configuration in this article, we’re confronted with a bit of a paradox. That is, even though sudo is a security tool, certain things that you can do with it can make your system even more insecure than it was. Let’s see how […]

The post Advanced tips and tricks for using sudo appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

reMarkable 2

With a paper-like feel, the reMarkable 2 handwriting tablet lets you take notes or sketch and then share the results with your device of choice.

Share Button
Read More
| by Scott Kilroy

Install Jenkins on Kubernetes

CI/CD (Continuous Integration/ Continuous Deployment) is a core concept of the DevOps world. It helps us to automate the software development processes: building, testing and deploying the source codes. Among many CI/CD tools, Jenkins is one of the mos…

Share Button
Read More
| by Scott Kilroy

Dell Will Soon Enable Privacy Controls for Linux Hardware

Dell makes it possible for Linux users to disable webcams and microphones.

Share Button
Read More
| by Arround The Web

Uses of Drone Technology That Might Interest You

Here’s the thing – if we were to talk about drones just a couple of decades ago, the probability is high that people would find the topic almost like something straight out of a sci-fi movie. Nowadays, the use of drone technology has spread to the com…

Share Button
Read More
| by Scott Kilroy

How to Create Bootable USB from ISO using Linux Terminal

There are many third-party tools to create a bootable Linux USB Drive. Here I will show you how to create a bootable USB flash from ISO file using the Linux terminal. Before we start make sure you have downloaded the […]
The post How to Create Bootab…

Share Button
Read More
| by Arround The Web

7 Proven Strategies to Increase Your Blog’s Traffic by 110%

If you think that telling your friends about your blog is the best thing you can do to promote your work, think again! While word of mouth remains one of the best organic ways to boost traffic, technology has created multiple other ways to achieve the …

Share Button
Read More
| by Scott Kilroy

Linux Mint Unveils New Packages

The Linux Mint team has announced it’ll bring an official Chromium package to the distribution

Share Button
Read More