How to learn tips and tricks - Page 6
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Swap your old Linux commands for new and improved alternatives that provide the same functionality, if not more.
Linux kernel 5.18 is here and users of Ubuntu and Ubuntu-based distributions can now install it if they need support for their hardware or just want to use some of its new features and enhancements.
The scp command makes copying files between Linux computers easy and secure. It uses SSH security, but best of all, it is simple. If you can use cp, you can use scp.
Setting up a system snapshot utility like Timeshift will make restoring your Linux system to any previous state a lot easier for you. Here's how this can be done.
Sudo has made Linux not only more secure but also more user-friendly. If you're new to Linux, this article will explain what sudo is and how it's used.
Learn how to configure and connect to a Microsoft SQL Server Database on a Linux machine using Docker containers.
System and network troubleshooting often involves checking and obtaining information about ports to ensure functionality and determine the source of problems. Learn some handy tips to help keep systems running smoothly.
To make sure no one can recover the data on your USB drive or SD card, learn how to securely erase data on Linux.
At some point, you might find yourself needing to remote into a Linux machine. When that eventuality occurs, you'll need SSH. This article introduces you to this handy Linux command.
Ghidra is one of the most popular reverse engineering frameworks for security professionals. Here's how to install it on Linux.
The first thing to do right after booting into Kali Linux for the first time is to change the default root password. Here's how you can do it.
Learn how to improve your security and privacy online with a semi-self-hosted solution on Linode. This tutorial shows how to set up a Linode instance, point a domain to Linode, set up Portainer and Nginx Proxy Manager and even created a network on Nginx Proxy Manager to be used by containers.
Rust is a modern programming language that focuses on thread safety and performance designed to compete with C and C++. Learn the steps to install and start using RUST on Debian 11 Bullseye Linux in this tutorial.
Learn about the basic interface and modules of Metasploit and how to use them to exploit MySQL vulnerabilities in Metasploitable 2.
Let’s run a few commands to disable or turn off the SELinux on Rocky Linux 8 using the command terminal.
Your system's security should always be your topmost concern. Here's how to perform a security audit on a Linux system with Lynis.
If you work in Infosec, chances are you had a very lousy weekend due to the critical Log4j zero-day vulnerability (CVE-2021-44228) that was discovered. Learn how to detect and block Log4j exploitation attempts with CrowdSec in this tutorial.
Log4j is a serious vulnerability that has swept across the IT landscape quickly. Here's a single command you can run to test and see if you have any vulnerable packages installed.
Curious to know if your RHEL-based distro has been patched against a specific CVE for a certain installed package? This tutorial shows you how.