| by Scott Kilroy

Security Auditing for linux with Auditd

So, you have a directory full of super-secret files that only a very few people need to see, and you want to know when unauthorized people try to see them. Or, maybe you want to see when a certain file gets changed, or you want to see when people log into the system and what […]

The post Security Auditing for linux with Auditd appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Scanning for Rootkits with Rootkit Hunter

Rootkits are exceedingly nasty pieces of malware that can definitely ruin your day. They can listen for commands from their masters, steal sensitive data and send it to their masters, or provide an easy-access back door for their masters. They’re designed to be stealthy, with the ability to hide themselves from plain view Install Rootkit […]

The post Scanning for Rootkits with Rootkit Hunter appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Monitor Network Traffic with vnStat on Ubuntu 20.04

vnStat is a free, open-source and console-based network traffic monitoring tool for Linux operating system. With vnStat, you can monitor network statistics over various time periods.

Share Button
Read More
| by Scott Kilroy

Different ways to schedule and list CRON jobs in Linux

Cron is a built-in Linux utility used to run different processes within the computer system at a particular scheduled time. This tutorial will assist you through several techniques to schedule and list Cron jobs in Linux.

Share Button
Read More
| by Scott Kilroy

Run ASCII Globe In Terminal With globe-cli Utility

Feeling bored at work? Let’s have some fun! The other day I stumbled upon…
The post Run ASCII Globe In Terminal With globe-cli Utility appeared first on OSTechNix.

Share Button
Read More
| by Scott Kilroy

How to Work with Date and Time in Bash Using date Command

Date command is an external bash program that allows to set or display system date and time. It also provides several formatting options. Date command is installed in all Linux distros by default. $
The post How to Work with Date and Time in Bash Using…

Share Button
Read More
| by Scott Kilroy

Securing Linux System With Maldet

Viruses are a real problem for computers that run the Windows operating system. But, as far as anyone has been able to tell, there’s no such thing as a virus that can harm a Linux-based operating system. So, the only real reason to run an antivirus solution on a Linux machine is to prevent infecting […]

The post Securing Linux System With Maldet appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Application Sandboxing with Firejail in Linux

If you have an untrusted application that needs to be run in your Linux system, you can use a sandbox to run the application in a limited environment. In this way you can use the untrusted application without worrying about the security of your system. Sandboxing with Firejail uses namespaces, SECCOMP, and kernel capabilities to […]

The post Application Sandboxing with Firejail in Linux appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

How To Edit A File Without Changing Its Timestamps In Linux

As you may know, the “access time” and “modify time” timestamps of a file…
The post How To Edit A File Without Changing Its Timestamps In Linux appeared first on OSTechNix.

Share Button
Read More
| by Scott Kilroy

Dog – Command Line DNS Client for DNS Lookup

Dog is a nice-looking command-line DNS Client for DNS lookup which works like dig. It has colorful output, understands normal command-line argument syntax, supports the DNS-over-TLS and DNS-over-HTTPS protocols, and can emit JSON. This tutorial shows h…

Share Button
Read More
| by Scott Kilroy

Linux File Timestamps Explained With Examples

This tutorial explains the types of Linux file timestamps and how to view and…
The post Linux File Timestamps Explained With Examples appeared first on OSTechNix.

Share Button
Read More
| by Scott Kilroy

SeaGL – Seattle GNU/Linux Conference Happening This Weekend!

by Webmaster

This Friday, November 13th and Saturday, November 14th, from 9am to 4pm PST the 8th annual SeaGL will be held virtually. This year features four keynotes, and a mix of tal…

Share Button
Read More
| by Scott Kilroy

Enforcing Strong Password Criteria Using PWQUALITY

Cyber-attacks are becoming increasingly ubiquitous and difficult to deal with and Hackers relentlessly try to exploit common weak passwords. As a result, organizations have to safeguard themselves by using strong password criteria to secure their systems. In this article, we’ll take a look at the mechanics of enforcing strong password criteria on a Linux system. […]

The post Enforcing Strong Password Criteria Using PWQUALITY appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Advanced tips and tricks for using sudo

Now that we’ve looked at the basics of setting up a good sudo configuration in this article, we’re confronted with a bit of a paradox. That is, even though sudo is a security tool, certain things that you can do with it can make your system even more insecure than it was. Let’s see how […]

The post Advanced tips and tricks for using sudo appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

reMarkable 2

With a paper-like feel, the reMarkable 2 handwriting tablet lets you take notes or sketch and then share the results with your device of choice.

Share Button
Read More
| by Scott Kilroy

Install Jenkins on Kubernetes

CI/CD (Continuous Integration/ Continuous Deployment) is a core concept of the DevOps world. It helps us to automate the software development processes: building, testing and deploying the source codes. Among many CI/CD tools, Jenkins is one of the mos…

Share Button
Read More
| by Scott Kilroy

Dell Will Soon Enable Privacy Controls for Linux Hardware

Dell makes it possible for Linux users to disable webcams and microphones.

Share Button
Read More
| by Scott Kilroy

Display Linux Commands Cheatsheets With Tealdeer Tool

The growing number of resources have made learning the Linux commands convenient and easier…
The post Display Linux Commands Cheatsheets With Tealdeer Tool appeared first on OSTechNix.

Share Button
Read More
| by Scott Kilroy

How to Create Bootable USB from ISO using Linux Terminal

There are many third-party tools to create a bootable Linux USB Drive. Here I will show you how to create a bootable USB flash from ISO file using the Linux terminal. Before we start make sure you have downloaded the […]
The post How to Create Bootab…

Share Button
Read More
| by Scott Kilroy

Install Nerd Fonts To Add Glyphs In Your Code On Linux

This brief tutorial explains what is Nerd Fonts project, how to install Nerd Fonts…
The post Install Nerd Fonts To Add Glyphs In Your Code On Linux appeared first on OSTechNix.

Share Button
Read More