| by Scott Kilroy

Securing Linux System With Maldet

Viruses are a real problem for computers that run the Windows operating system. But, as far as anyone has been able to tell, there’s no such thing as a virus that can harm a Linux-based operating system. So, the only real reason to run an antivirus solution on a Linux machine is to prevent infecting […]

The post Securing Linux System With Maldet appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Application Sandboxing with Firejail in Linux

If you have an untrusted application that needs to be run in your Linux system, you can use a sandbox to run the application in a limited environment. In this way you can use the untrusted application without worrying about the security of your system. Sandboxing with Firejail uses namespaces, SECCOMP, and kernel capabilities to […]

The post Application Sandboxing with Firejail in Linux appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Dog – Command Line DNS Client for DNS Lookup

Dog is a nice-looking command-line DNS Client for DNS lookup which works like dig. It has colorful output, understands normal command-line argument syntax, supports the DNS-over-TLS and DNS-over-HTTPS protocols, and can emit JSON. This tutorial shows h…

Share Button
Read More
| by Arround The Web

How to Find a Budget Laptop With Good Performance

Seeking out and purchasing something like a laptop can be really daunting. Especially if you need to use this tool to complete work for your job or schoolwork, you’ll have specific requirements that need to be met. Beyond this, your hobbies like videog…

Share Button
Read More
| by Scott Kilroy

SeaGL – Seattle GNU/Linux Conference Happening This Weekend!

by Webmaster

This Friday, November 13th and Saturday, November 14th, from 9am to 4pm PST the 8th annual SeaGL will be held virtually. This year features four keynotes, and a mix of tal…

Share Button
Read More
| by Scott Kilroy

Enforcing Strong Password Criteria Using PWQUALITY

Cyber-attacks are becoming increasingly ubiquitous and difficult to deal with and Hackers relentlessly try to exploit common weak passwords. As a result, organizations have to safeguard themselves by using strong password criteria to secure their systems. In this article, we’ll take a look at the mechanics of enforcing strong password criteria on a Linux system. […]

The post Enforcing Strong Password Criteria Using PWQUALITY appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Advanced tips and tricks for using sudo

Now that we’ve looked at the basics of setting up a good sudo configuration in this article, we’re confronted with a bit of a paradox. That is, even though sudo is a security tool, certain things that you can do with it can make your system even more insecure than it was. Let’s see how […]

The post Advanced tips and tricks for using sudo appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

reMarkable 2

With a paper-like feel, the reMarkable 2 handwriting tablet lets you take notes or sketch and then share the results with your device of choice.

Share Button
Read More
| by Scott Kilroy

Install Jenkins on Kubernetes

CI/CD (Continuous Integration/ Continuous Deployment) is a core concept of the DevOps world. It helps us to automate the software development processes: building, testing and deploying the source codes. Among many CI/CD tools, Jenkins is one of the mos…

Share Button
Read More
| by Scott Kilroy

Dell Will Soon Enable Privacy Controls for Linux Hardware

Dell makes it possible for Linux users to disable webcams and microphones.

Share Button
Read More
| by Arround The Web

Uses of Drone Technology That Might Interest You

Here’s the thing – if we were to talk about drones just a couple of decades ago, the probability is high that people would find the topic almost like something straight out of a sci-fi movie. Nowadays, the use of drone technology has spread to the com…

Share Button
Read More
| by Scott Kilroy

How to Create Bootable USB from ISO using Linux Terminal

There are many third-party tools to create a bootable Linux USB Drive. Here I will show you how to create a bootable USB flash from ISO file using the Linux terminal. Before we start make sure you have downloaded the […]
The post How to Create Bootab…

Share Button
Read More
| by Arround The Web

7 Proven Strategies to Increase Your Blog’s Traffic by 110%

If you think that telling your friends about your blog is the best thing you can do to promote your work, think again! While word of mouth remains one of the best organic ways to boost traffic, technology has created multiple other ways to achieve the …

Share Button
Read More
| by Scott Kilroy

Linux Mint Unveils New Packages

The Linux Mint team has announced it’ll bring an official Chromium package to the distribution

Share Button
Read More
| by Scott Kilroy

WordPress Dashboard & Settings Page | WordPress 101

WordPress dashboard is an important page for the website administrators. In this article of the WordPress 101 series, we will learn to read and customize the WordPress dashboard. If you do not know to set up WordPress, we have written a detailed guide on how to install WordPress – Step…

The post WordPress Dashboard & Settings Page | WordPress 101 appeared first on Linux Tutorials, FOSS Reviews, Security News.

Share Button
Read More
| by Scott Kilroy

Hot Swappable Filesystems, as Smooth as Btrfs

by Tedley Meralus

Filesystems, like file cabinets or drawers, control how your operating system stores data. They also hold metadata like filetypes, what is attached to data, and who h…

Share Button
Read More
| by Scott Kilroy

Things To Remember Before Upgrading Production Server

Server security is the topmost priority for every system administrator. Besides having third-party security tools like Firewall, DDoS protection, etc. it is extremely important to keep every piece of code up-to-date on your production server. When your application is in production, upgrading it is riskier. If your server is powered…

The post Things To Remember Before Upgrading Production Server appeared first on Linux Tutorials, FOSS Reviews, Security News.

Share Button
Read More
| by Scott Kilroy

Best Ubuntu Preinstalled Laptops

Now all almost major laptop companies offer pre-offered Ubuntu systems. On top of getting the Ubuntu work area experience, the client gets adjusted highlights and advantages. The benefit you get is that laptops have undergone rigorous tests to ensure a…

Share Button
Read More
| by Arround The Web

6 Tips To Remember When Building A High-End Computer From Scratch

There are so many reasons why you’d want to build your PC. First and foremost, this is the most cost-effective way of owning a high-end PC. Secondly, you’ll customize and upgrade your PC according to your specific needs. As if this is not enough, it’s …

Share Button
Read More
| by Scott Kilroy

5 Ways to Take Screenshots on Arch Linux

In this article, I will show you how to take a screenshot in Arch Linux. By default Arch installation (GUI) comes with a screenshot utility. But there are other efficient and simple third-party utilities to take a screenshot on Arch […]
The post 5 Wa…

Share Button
Read More