Linux

Linux news, analysis, research, how-to, opinion, and video.


template c100.00 01 37 22.still001
video

2-Minute Linux Tip: How to add and delete user accounts

In today’s Linux tip, we’re going to look at the adduser and deluser commands. As the names suggest, they are used to add and delete user accounts on Linux systems.

what is cloud native.00 00 22 14.still001
video

What is the cloud-native approach?

In this 60-second video, learn how the cloud-native approach is changing the way enterprises structure their technologies, from Craig McLuckie, founder and CEO of Heptio, and one of the inventors of open-source system Kubernetes

Linux alias command
video

2-Minute Linux Tip: Learn how to use the alias command

In today’s 2-minute tip, we’re going to look at the alias command – a tool that can save you a lot of time and trouble and maybe even a few brain cells.

history
video

2-Minute Linux Tip: Learn how to use the history command

In today's 2-minute Linux Tip, we look at the bash history command – a tool that shows you commands you've recently used and allows you to use them again without having to retype them.

logsave
video

2-Minute Linux Tip: Learn how to use the logsave command

In today’s 2-minute Linux Tip, we’re going to look at a command that you might never have heard of. It’s called logsave, and it allows you to selectively add command output to a file.

Linux ping command
video

2-Minute Linux Tip: Learn how to use the ping command

In today’s 2-minute tip, we’re going to look at the ping command – a favorite tool for some very easy troubleshooting.

Linux tips contrab
video

2-Minute Linux Tip: Learn how to use the crontab command

Today’s 2-minute tip covers crontab – the tool used to schedule tasks that will run automatically on the day and time that you specify.

2 linux malware scarier

GoScanSSH malware targets Linux systems but avoids government servers

A new strain of malware aimed at Linux-based SSH servers is actively trying to avoid infecting government or military systems.

Salted Hash Ep 17: Spectre and Meltdown, a vehicle that no one is using

Welcome to another episode of Salted Hash. This week, Salted Hash is joined by our new Staff Writer, J.M. Porup, to talk about some recent developments related to Spectre and Meltdown, including patch fixes, future mitigations, and a...

meltdown spectre

Spectre and Meltdown: What you need to know going forward

As you've likely heard by now, there are some problems with Intel, AMD, and ARM processors. Called Meltdown and Spectre, the discovered attack possibilities are rather severe, as they impact pretty much every technical device on the...

2 linux malware scarier

Linux antivirus and anti malware: 8 top tools

Malware and viruses on a Linux system? You weren’t operating under the illusion that using Linux meant you don’t have to worry about that, were you? Fake news!

linuxcon europe linus torvalds 05

Linus Torvalds: Some security folks can't be trusted to do sane things, some are morons

Proposed changes to version 4.15 of the Linux kernel resulted in Linux creator Linus Torvalds going on a profanity-laced rant about security professionals.

BlueBorne Bluetooth attack stage fright

BlueBorne is Bluetooth's Stagefright moment

The scariest thing about BlueBorne, the attack vector that uses Bluetooth to spread across devices, isn't what it can do, but rather just how many similar vulnerabilities may be lurking that we don't yet know about.

cyber attack virus meltdown

5.3 billion devices at risk for invisible, infectious Bluetooth attack

Meet the BlueBorne attack vector; patch or turn off Bluetooth, as this is a wormable threat that spreads through the air without requiring user interaction.

pi book

39% off Exploring Raspberry Pi: Interfacing to the Real World with Embedded Linux, Paperback - Deal Alert

The innovators guide to bringing Raspberry Pi to life. This book favors engineering principles over a 'recipe' approach to give you the skills you need to design and build your own projects. You'll understand the fundamental...

code programming software bugs cybersecurity

Patch the Samba bug before a network worm exploits it

It isn’t at WannaCry-crisis levels yet, but the fact that Samba is so widely used means a network worm can really have a field day exploiting this vulnerability.

Security online

Eleven-year-old root flaw found and patched in the Linux kernel

Linux system administrators should watch for kernel updates for their distributions and apply them as soon as possible because they fix a local privilege escalation flaw that could lead to a full system compromise.

linux security lick

Self-protection is key to Linux kernel security

Finding and fixing Linux security vulnerabilities amounts to the usual whack-a-mole. The real solution is to harden the Linux kernel and let it protect itself

Load More