| by Arround The Web

How To Set Up SSH Keys With YubiKey as two-factor authentication (U2F/FIDO2)

Patreon users download the PDF version.
All Linux and Unix servers are managed manually or by automation tools such as Ansible using ssh. For example, say you have a server at Linode or AWS. Then you copy your public ssh key to a remote cloud server. O…

Share Button
Read More
| by Arround The Web

Arch Linux-Based SystemRescue 9.04 Distro Brings New Packages

SystemRescue 9.04 comes with several new packages to make your system administration tasks easier. Learn more here.
The post Arch Linux-Based SystemRescue 9.04 Distro Brings New Packages appeared first on Linux Today.

Share Button
Read More
| by Arround The Web

DNS settings to avoid email spoofing and phishing for unused domain

As you may know, email spoofing allows attackers to pose as someone else to gain illegal profit. For example, I only use webmaster@cyberciti.biz for communication, but someone might create a spoofed-up email, say info@opensourceflare.com, to trick som…

Share Button
Read More
| by Arround The Web

How to protect Linux against rogue USB devices using USBGuard

usbgurd

You deployed a perfect firewall and other network security policies preventing unauthorized access to the user’s desktop computer over a network. However, you still need to block USB device access. We can configure a Linux desktop security po…

Share Button
Read More
| by Arround The Web

A cautionary tale about locking Linux & FreeBSD user accounts

Like every other solo developer and sysadmin, I do stuff using ssh. Some stuff is automated using scripts, and others require ssh login. For example, one of my scripts logs into my Linux and FreeBSD server using public ssh keys and does a particular t…

Share Button
Read More
| by Arround The Web

Linux crontab Tutorial with Examples

Regardless of your current level of knowledge, this article offers a Linux crontab tutorial with examples. Learn more here.
The post Linux crontab Tutorial with Examples appeared first on Linux Today.

Share Button
Read More
| by Arround The Web

How to Determine OS of a Remote Host

When performing digital reconnaissance or penetrating testing, it’s important to fingerprint a network by understanding what operating system is used on a remote host. Nmap is a great tool for this job. Although normally associated with the cybersecurity field and penetration testing, Nmap can also be used for benevolent purposes, such as a system administrator […]

The post How to Determine OS of a Remote Host appeared first on Linux Today.

Share Button
Read More
| by Arround The Web

Why Do Programmers Prefer to Use Linux?

Windows is the most widely used operating system, both in home and business environments. Most programs are created to run on this operating system. However, the people who create these programs (mainly developers, programmers, and system administrat…

Share Button
Read More
| by Arround The Web

Top 10 Container Guides for SysAdmins

Check out this list of top 10 container guides for sysadmins. Learn what’s happening in the world of containers and how to better manage this technology.
The post Top 10 Container Guides for SysAdmins appeared first on Linux Today.

Share Button
Read More
| by Arround The Web

How to migrate from CentOS 8 to AlmaLinux (conversion)

I already wrote about migrating from CentOS 8 to CentOS Stream. I also have a guide about migrating from CentOS 8 to Rocky Linux. Today, I am working on another side project with my partner, and I wanted to try out AlmaLinux. Hence, this quick post wil…

Share Button
Read More
| by Arround The Web

30 Useful Linux Commands for System Administrators

In this article we are going to review some of the useful and frequently used Linux or Unix commands for Linux System Administrators that are used in their daily life.
The post 30 Useful Linux Commands for System Administrators appeared first on Linux …

Share Button
Read More
| by Arround The Web

Creating Your Own Webserver and Hosting A Website from Your Linux Box

Many of you would be web programmers. Some of you might own a website and would certainly be editing and updating it frequently. Meanwhile, a few have no adequate knowledge of web technologies but are still be planning to have one.  Through this article, I will help you learn to develop a working website with […]

The post Creating Your Own Webserver and Hosting A Website from Your Linux Box appeared first on Linux Today.

Share Button
Read More
| by Arround The Web

How to migrate from CentOS 8 to Rocky Linux (conversion)

I already wrote about migrating from CentOS 8 to CentOS Stream. Now, I am migrating Linode VM from CentOS 8 to Rocky Linux 8. The server runs a very simple workload that includes PHP 8.1, MariaDB server and Nginx, and SELinux and firewalld.
Love this? …

Share Button
Read More
| by Arround The Web

How to Set Up a Simple Apache Web Server in a Docker Container

If you are a Linux system administrator who provides support for developers, chances are you’ve heard of Docker. If not, this software solution will make your life easier by reducing operating costs and accelerating deployments. Learn how to set up a s…

Share Button
Read More
| by Arround The Web

Curl Commands in Linux: 15 Examples

This article explains how to use curl in Linux with 15 examples. The curl command is one of the most powerful and useful tools used by web developers as well as by PHP programmers and system administrators. Most commonly, it is used to transfer data between remote and local systems. Through this command, we can […]

The post Curl Commands in Linux: 15 Examples appeared first on Linux Today.

Share Button
Read More
| by Arround The Web

How to migrate from CentOS 8 to CentOS stream conversion

As you know, CentOS 8 is ending soon. Red Hat is making the shift from CentOS 8 to CentOS Stream. CentOS stream places itself between Fedora Linux and RHEL. It is not 100% RHEL clone but ahead of RHEL development. Think of it as a midstream distro. Of …

Share Button
Read More
| by Arround The Web

Basic Echo Command with Examples in Linux

The echo command is one of the most basic and important commands in scripting and programming. This command displays or prints arguments at the terminal. The command is included in all distributions (operating systems) as either the shell or bash. Usually, developers or programmers use echo commands in both debugging and building of products such […]

The post Basic Echo Command with Examples in Linux appeared first on Linux Today.

Share Button
Read More
| by Arround The Web

Web VMStat: A Real Time System Statistics (Memory, CPU, Processess, etc) Monitoring Tool for Linux

Web-VMstat—it’s a small application written in Java and HTML which displays live Linux system statistics, such as Memory, CPU, I/O, Processes, etc. taken over vmstat monitoring command line. It’s all presented on a pretty Web page with charts (Sm…

Share Button
Read More
| by Arround The Web

How to Perform a Remote Linux Backup Using SSH

Secure Shell or SSH is responsible for successful network communication between two remote computers. For a Linux system administrator, this networking tool is the perfect solution for remote server/machine access over unsecured networks. Learn how to …

Share Button
Read More
| by Arround The Web

How to Check/Repair Your Linux File System on Boot

An operating system user that is still a learner in the OS world can never escape the challenges the current elite users have overcome. The user impact of such challenges depends on the operating system flavor or distribution you are under. For Linux users, you might think you are facing an impossible challenge only to […]

The post How to Check/Repair Your Linux File System on Boot appeared first on Linux Today.

Share Button
Read More