Author: CsarGrnds

SSH Key On Linux

SSH Key On Linux

SSH key identify trusted computers, without the need of passwords. One immediate advantage this method has over traditional password authentication is that you can be authenticated without having to send your password over the network offering additional...

Systemd

Systemd

Systemd primarily aims to replace the Linux init system, is a suite of system management daemons, libraries, and utilities designed as a central management and configuration platform for the Linux computer operating system. Systemd...

Linux Backup Tools

Linux Backup Tools

Linux backup tools, A good plan b (backup) is essential in order to have the ability to recover from human errors, RAID or disk failure or File system corruption. A dependable backup tool is not...

Introduction To The Command Line

Introduction To The Command Line

What is a command line? Command line or shell is the program that interprets commands, Allows a user to execute commands by typing them manually at a terminal, or automatically in programs called shell scripts. A shell...

Understanding Linux CPU Load

Understanding Linux CPU Load

Are you having problems understanding Linux CPU Load? You don’t know when is good or bad… or what those three numbers mean? Understanding Linux CPU Load If you are a sysadmin one of the...

Bash Shellshock Vulnerability CVE-2014-6271

Bash Shellshock Vulnerability CVE-2014-6271

Shellshock Vulnerability On September 24, 2014, a GNU Bash vulnerability, referred to as Shellshock or the “Bash Bug”, was disclosed. In short, the vulnerability allows remote attackers to execute arbitrary code given certain conditions,...

Free Programming Books – BASH

Free Programming Books – BASH

Bash is a command processor that typically runs in a text window, where the user types commands that cause actions. It can also read commands from a file, called a script. Like all Unix...

Best Practices For Linux OpenSSH Server

Best Practices For Linux OpenSSH Server

What is OpenSSH? OpenSSH is a suite of security-related network-level utilities based on the SSH protocol, which help to secure network communications via the encryption of network traffic over multiple authentication methods and by...