Linux

Linux | News, how-tos, features, reviews, and videos


template c100.00 04 16 56.still001
video

Linux tip: How to use the find command

In today’s Linux tip, we look at the find command – a tool that will prove very useful when you’re trying to locate a file or set of files based on almost any criteria.

template c100.00 01 16 36.still001
video

2-Minute Linux Tip: How to use the top command

In today’s Linux tip, we’re going to look at top – a favorite tool for examining performance on a Linux system. Want to pinpoint why your Linux system is running slowly? Top can shed a lot of light on that.

template c100.00 01 12 06.still001
video

2-Minute Linux Tip: How to use the mtr command

In today’s Linux tip, we’re going to look at the mtr command and see what it can tell us about network connections. Mtr stands for “my traceroute” and displays the route that a connection to a particular system takes by providing a...

template c100.00 01 17 08.still001
video

2-Minute Linux Tip: How to terminate processes

In today’s tip, I’m going to show you how to terminate processes on Linux systems using kill, pkill and killall and show you why it makes a difference which command you choose.

template c100.00 01 37 22.still001
video

2-Minute Linux Tip: How to add and delete user accounts

In today’s Linux tip, we’re going to look at the adduser and deluser commands. As the names suggest, they are used to add and delete user accounts on Linux systems.

what is cloud native.00 00 22 14.still001
video

What is the cloud-native approach?

In this 60-second video, learn how the cloud-native approach is changing the way enterprises structure their technologies, from Craig McLuckie, founder and CEO of Heptio, and one of the inventors of open-source system Kubernetes

Linux alias command
video

2-Minute Linux Tip: Learn how to use the alias command

In today’s 2-minute tip, we’re going to look at the alias command – a tool that can save you a lot of time and trouble and maybe even a few brain cells.

history
video

2-Minute Linux Tip: Learn how to use the history command

In today's 2-minute Linux Tip, we look at the bash history command – a tool that shows you commands you've recently used and allows you to use them again without having to retype them.

logsave
video

2-Minute Linux Tip: Learn how to use the logsave command

In today’s 2-minute Linux Tip, we’re going to look at a command that you might never have heard of. It’s called logsave, and it allows you to selectively add command output to a file.

Linux ping command
video

2-Minute Linux Tip: Learn how to use the ping command

In today’s 2-minute tip, we’re going to look at the ping command – a favorite tool for some very easy troubleshooting.

Linux tips contrab
video

2-Minute Linux Tip: Learn how to use the crontab command

Today’s 2-minute tip covers crontab – the tool used to schedule tasks that will run automatically on the day and time that you specify.

2 linux malware scarier

GoScanSSH malware targets Linux systems but avoids government servers

A new strain of malware aimed at Linux-based SSH servers is actively trying to avoid infecting government or military systems.

Salted Hash Ep 17: Spectre and Meltdown, a vehicle that no one is using

Welcome to another episode of Salted Hash. This week, Salted Hash is joined by our new Staff Writer, J.M. Porup, to talk about some recent developments related to Spectre and Meltdown, including patch fixes, future mitigations, and a...

meltdown spectre

Spectre and Meltdown: What you need to know going forward

As you've likely heard by now, there are some problems with Intel, AMD, and ARM processors. Called Meltdown and Spectre, the discovered attack possibilities are rather severe, as they impact pretty much every technical device on the...

2 linux malware scarier

Linux antivirus and anti malware: 8 top tools

Malware and viruses on a Linux system? You weren’t operating under the illusion that using Linux meant you don’t have to worry about that, were you? Fake news!

linuxcon europe linus torvalds 05

Linus Torvalds: Some security folks can't be trusted to do sane things, some are morons

Proposed changes to version 4.15 of the Linux kernel resulted in Linux creator Linus Torvalds going on a profanity-laced rant about security professionals.

BlueBorne Bluetooth attack stage fright

BlueBorne is Bluetooth's Stagefright moment

The scariest thing about BlueBorne, the attack vector that uses Bluetooth to spread across devices, isn't what it can do, but rather just how many similar vulnerabilities may be lurking that we don't yet know about.

cyber attack virus meltdown

5.3 billion devices at risk for invisible, infectious Bluetooth attack

Meet the BlueBorne attack vector; patch or turn off Bluetooth, as this is a wormable threat that spreads through the air without requiring user interaction.

Load More