How to learn tips and tricks - Page 3
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
In Debian, managing user privileges and administrative access is crucial for maintaining a secure and efficient system. By granting users the ability to execute administrative tasks without relying on the root account, you can enhance security, control access to sensitive operations, and maintain an audit trail of user activity.
In the client-server architecture used by the SSH protocol, a client can authenticate by providing a tunneled clear text password or by using a public/private key pair: this is called public key authentication. A user who logs in via a public key on a remote machine has complete access to the command line; in certain situations, however, it may be useful to associate a public key to a single specific command, for security reasons.
Ever tried to execute a command on your Linux system and received a “Permission Denied” error? The simplest solution to counter this error is using the “sudo” command.
Sudo stands for "superuser do" and effectively gives a regular user access to administrator-like powers. Here's how to use this powerful tool.
Reduce the chances of hackers gaining access to your Linux servers by installing and configuring Fail2ban.
If you are a system administrator and are looking for ways to make your Linux system more secure or want to automate certain processes, creating a non-login user is the solution. Non-login users can prove to be very useful for a variety of cases right from limiting access to your Linux system to running specific processes with restricted privileges. Here, we will guide you through the steps to create a non-login user in Linux and set the appropriate permissions for them.
SSH is a globally-used protocol used to access remote servers. Here's how you can strengthen your SSH connections on Linux for maximum security.
File restoration utilities are one of the most important programs in a Linux administrator’s toolkit. They provide the ability to recover deleted files, even in cases where the disk is either physically damaged or wiped clean.
SELinux is a robust and customizable security system that is shipped by default on many Linux operating systems, such as Fedora and RHEL. If you would like to add extra security to your Ubuntu server, follow along as we show you how to secure your Ubuntu Linux server with SELinux.
A look at the process to get insight into supported system calls and features and to assess how secure a system is and its runtime activity.
Even though the Linux platform you develop on is considered very secure, it doesn’t mean it’s 100% guaranteed to be safe. Case in point: the fork bomb.
Get started with web application testing on your Linux computer by installing Burp Suite.
Linux distros are increasingly becoming more and more GUI-based and easier for beginners to use. That said, their real power still lies in the terminal which requires the user to know different commands and syntaxes to be able to use them properly.
Ubuntu Pro gives your desktop Linux operating system 10 years of security updates, so that it can go an entire decade on the same release. Find out how easy it is to enable this feature.
SELinux is a kernel module that injects additional security-focused functionalities into the Linux kernel. Here's how you can install it on Ubuntu.
We know that the most effective way to strengthen system security and protect against any cyber threat is to keep our system updated with the latest OS and application software patches. For Linux the kernel upgrades and security patches require a system reboot, hence it is hard to maintain the OS safe. Here we are going to see how to update the Linux kernels, without a reboot.
If you’re administering a Linux server, chances are you have a lot of user accounts to manage and, along with these, a lot of files and settings to control. Here are some commands and issues that are important in setting up and managing user accounts and access rights.
During my internship at Trail of Bits, I prototyped a harness that improves the testability of the eBPF verifier, simplifying the testing of eBPF programs. My eBPF harness runs in user space, independently of any locally running kernel, and thus opens the door to testing of eBPF programs across different kernel versions.
Pwn XSS is a powerful tool that is commonly used by malicious hackers as well as security professionals today. The term "pwn" comes from "own", as in "to have power or mastery over (someone)." Pwn XSS is an open source cross site scripting vulnerability scanner made in python 3.7. This tool is used to find vulnerabilities in websites and web apps that can be compromised and allow a hacker to exploit for malicious reasons. It can also be used by security professionals to test their own websites to be sure it's free from any cross-site scripting vulnerabilities, as well as cybersecurity students, learning about how cross-site scripting works, why it can be a potential security risk, and ideas for how security and protection against these attacks can be improved.
Applying updates regularly should be the top priority in the day-to-day tasks of a System administrator. Running unpatched systems for a long time is quite risky. There are many ways to patch your Linux systems. Today, we will learn how to apply updates automatically with dnf-automatic in RHEL and its clones like AlmaLinux and Rocky Linux.