| by Scott Kilroy

Best Diff Tools to Compare File Contents on Linux

Diff tools are used by countless people all around the world, be it developers, web designers, editors, photographers, engineers, the possibilities are countless. They use these tools to find out the differences between different files, folders, and di…

Share Button
Read More
| by Scott Kilroy

How to Install and Create a Blog with Hexo on Ubuntu 20.04

Hexo is a static blogging framework built on Node.js, it allows you to write posts in Markdown format. In this tutorial, you will learn how to Install Hexo and use it to create a blog on Ubuntu 20.04 based server.

Share Button
Read More
| by Scott Kilroy

Linux log review with logwatch

You know how important it is to do a daily log review. But you also know how much of a drag it is, and that you’d rather take a severe beating. Fortunately, there are various utilities that can make the job easier. Of the various choices in the normal Linux distro repositories, Logwatch is a […]

The post Linux log review with logwatch appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Collect logs with journald in linux

You’ll find the journald logging system on any Linux distro that uses the systemd ecosystem. Instead of sending its messages to text files, journald sends messages to binary files. Instead of using normal Linux text file utilities to extract information, you have to use the journalctl utility. #journalctl To view the journald log file in […]

The post Collect logs with journald in linux appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

How to Install and Use i3 Window Manager on Linux

Written in C language, the i3wm ( i3 Windows Manager ) is a lightweight, easy-to-configure, and hugely popular tiling windows manager. Unlike the conventional desktop environment, a tiling manager provides just sufficient functionality to
The post How …

Share Button
Read More
| by Scott Kilroy

Linux Stat Command Explained

The stat command is used in Linux/Unix system to display detailed information about files and file systems. It is most commonly used to get file timestamps. The Linux ls command usually gives you basic details about a file whereas stat […]
The post L…

Share Button
Read More
| by Arround The Web

How Technology Can Help You Find And Save Videos

When you get bored, you’ll want to find a way to stay busy. Being bored can create a number of problems for you and your loved ones. If you’re not careful, you may do something you regret. Staying busy can help prevent that from happening. When you sta…

Share Button
Read More
| by Arround The Web

How to Generate More Traffic to Your Website

If you have a website as a business or to support one, driving traffic is key in getting the conversion, subsequently, growth and success you’re aiming for. Basically, it starts with how many clicks you get for your site. Building a site or starting a …

Share Button
Read More
| by Scott Kilroy

Security Auditing for linux with Auditd

So, you have a directory full of super-secret files that only a very few people need to see, and you want to know when unauthorized people try to see them. Or, maybe you want to see when a certain file gets changed, or you want to see when people log into the system and what […]

The post Security Auditing for linux with Auditd appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Scanning for Rootkits with Rootkit Hunter

Rootkits are exceedingly nasty pieces of malware that can definitely ruin your day. They can listen for commands from their masters, steal sensitive data and send it to their masters, or provide an easy-access back door for their masters. They’re designed to be stealthy, with the ability to hide themselves from plain view Install Rootkit […]

The post Scanning for Rootkits with Rootkit Hunter appeared first on The Linux Juggernaut.

Share Button
Read More
| by Arround The Web

How to Utilize the Advanced Data Recovery Technology Available in the World

In today’s digital world, data storage devices play a very important role in our professional as well as personal lives because we store every bit of useful information on one or another data storage device. Nothing will make you feel more helpless tha…

Share Button
Read More
| by Scott Kilroy

Monitor Network Traffic with vnStat on Ubuntu 20.04

vnStat is a free, open-source and console-based network traffic monitoring tool for Linux operating system. With vnStat, you can monitor network statistics over various time periods.

Share Button
Read More
| by Scott Kilroy

Different ways to schedule and list CRON jobs in Linux

Cron is a built-in Linux utility used to run different processes within the computer system at a particular scheduled time. This tutorial will assist you through several techniques to schedule and list Cron jobs in Linux.

Share Button
Read More
| by Scott Kilroy

How to Work with Date and Time in Bash Using date Command

Date command is an external bash program that allows to set or display system date and time. It also provides several formatting options. Date command is installed in all Linux distros by default. $
The post How to Work with Date and Time in Bash Using…

Share Button
Read More
| by Scott Kilroy

Securing Linux System With Maldet

Viruses are a real problem for computers that run the Windows operating system. But, as far as anyone has been able to tell, there’s no such thing as a virus that can harm a Linux-based operating system. So, the only real reason to run an antivirus solution on a Linux machine is to prevent infecting […]

The post Securing Linux System With Maldet appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Application Sandboxing with Firejail in Linux

If you have an untrusted application that needs to be run in your Linux system, you can use a sandbox to run the application in a limited environment. In this way you can use the untrusted application without worrying about the security of your system. Sandboxing with Firejail uses namespaces, SECCOMP, and kernel capabilities to […]

The post Application Sandboxing with Firejail in Linux appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Dog – Command Line DNS Client for DNS Lookup

Dog is a nice-looking command-line DNS Client for DNS lookup which works like dig. It has colorful output, understands normal command-line argument syntax, supports the DNS-over-TLS and DNS-over-HTTPS protocols, and can emit JSON. This tutorial shows h…

Share Button
Read More
| by Arround The Web

How to Find a Budget Laptop With Good Performance

Seeking out and purchasing something like a laptop can be really daunting. Especially if you need to use this tool to complete work for your job or schoolwork, you’ll have specific requirements that need to be met. Beyond this, your hobbies like videog…

Share Button
Read More
| by Scott Kilroy

SeaGL – Seattle GNU/Linux Conference Happening This Weekend!

by Webmaster

This Friday, November 13th and Saturday, November 14th, from 9am to 4pm PST the 8th annual SeaGL will be held virtually. This year features four keynotes, and a mix of tal…

Share Button
Read More
| by Scott Kilroy

Enforcing Strong Password Criteria Using PWQUALITY

Cyber-attacks are becoming increasingly ubiquitous and difficult to deal with and Hackers relentlessly try to exploit common weak passwords. As a result, organizations have to safeguard themselves by using strong password criteria to secure their systems. In this article, we’ll take a look at the mechanics of enforcing strong password criteria on a Linux system. […]

The post Enforcing Strong Password Criteria Using PWQUALITY appeared first on The Linux Juggernaut.

Share Button
Read More