Forem

Linux

What are clouds made of? Linux servers, mostly.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Day 13/ 30 Days of Linux Mastery: Task Automation with Cron

Day 13/ 30 Days of Linux Mastery: Task Automation with Cron

4
Comments
4 min read
Your Guide to Basic Linux Commands Day02

Your Guide to Basic Linux Commands Day02

Comments 1
2 min read
“Houston, We’ve Got a Firewall Problem” — A Day in the Life of a RHEL 9 Sysadmin

“Houston, We’ve Got a Firewall Problem” — A Day in the Life of a RHEL 9 Sysadmin

3
Comments
3 min read
Oracle AI Database 26ai — Storing Flashback Logs Outside FRA

Oracle AI Database 26ai — Storing Flashback Logs Outside FRA

Comments
2 min read
Day 14/ 30 Days of Linux Mastery: Find Command

Day 14/ 30 Days of Linux Mastery: Find Command

7
Comments
3 min read
Hardening File Permissions: Practical Steps to Lock Down Data
Cover image for Hardening File Permissions: Practical Steps to Lock Down Data

Hardening File Permissions: Practical Steps to Lock Down Data

8
Comments
4 min read
🏰 Blog – Privileged Access Management (PAM): Locking Down the Keys to the Kingdom

🏰 Blog – Privileged Access Management (PAM): Locking Down the Keys to the Kingdom

Comments
3 min read
🚀 Application Tier Platform Migration Oracle EBS R12.2.x
Cover image for 🚀 Application Tier Platform Migration Oracle EBS R12.2.x

🚀 Application Tier Platform Migration Oracle EBS R12.2.x

Comments
3 min read
Your Guide to Basic Linux Commands Day01

Your Guide to Basic Linux Commands Day01

Comments 1
2 min read
Mastering Linux Text Processing Commands: cut, awk, grep, and more
Cover image for Mastering Linux Text Processing Commands: cut, awk, grep, and more

Mastering Linux Text Processing Commands: cut, awk, grep, and more

3
Comments
4 min read
Meet Your New Best Friend in RHEL 9: grep (a.k.a. The Text Detective)

Meet Your New Best Friend in RHEL 9: grep (a.k.a. The Text Detective)

5
Comments
3 min read
How to install Kali Linux CLI on Chromebook without enabling linux environment
Cover image for How to install Kali Linux CLI on Chromebook without enabling linux environment

How to install Kali Linux CLI on Chromebook without enabling linux environment

5
Comments
2 min read
How I Spot a Suspicious Process on My Linux Server (Before It Does Damage) | by Faruk Ahmed | Jun, 2025

How I Spot a Suspicious Process on My Linux Server (Before It Does Damage) | by Faruk Ahmed | Jun, 2025

Comments 1
1 min read
How I Use auditd to Catch Hidden Changes on My Linux Server | by Faruk Ahmed | Jun, 2025

How I Use auditd to Catch Hidden Changes on My Linux Server | by Faruk Ahmed | Jun, 2025

Comments 2
1 min read
Linux vs. Windows: A Clear Comparison

Linux vs. Windows: A Clear Comparison

Comments
3 min read
Ambiente Linux para Desenvolvimento: Por que escolhi e não me arrependo
Cover image for Ambiente Linux para Desenvolvimento: Por que escolhi e não me arrependo

Ambiente Linux para Desenvolvimento: Por que escolhi e não me arrependo

Comments
4 min read
Comparativa entre Fedora y Pop!_OS: dos distribuciones Linux para usuarios exigentes

Comparativa entre Fedora y Pop!_OS: dos distribuciones Linux para usuarios exigentes

Comments 1
2 min read
Accidentally Building Cluster OS - Part 1 - How It All Started
Cover image for Accidentally Building Cluster OS - Part 1 - How It All Started

Accidentally Building Cluster OS - Part 1 - How It All Started

1
Comments 1
3 min read
Access Control Lists in Linux for Granular Permissions (Day 11 of 30)
Cover image for Access Control Lists in Linux for Granular Permissions (Day 11 of 30)

Access Control Lists in Linux for Granular Permissions (Day 11 of 30)

2
Comments
2 min read
Mastering Linux File Permissions
Cover image for Mastering Linux File Permissions

Mastering Linux File Permissions

Comments
2 min read
How RHEL 9 and the Cloud Are Basically Besties – A Beginner-Friendly Guide (With Real-Life Drama)

How RHEL 9 and the Cloud Are Basically Besties – A Beginner-Friendly Guide (With Real-Life Drama)

3
Comments
5 min read
🛡️ Blog – Multi-Factor Authentication (MFA): Your Critical Second Layer of Defense

🛡️ Blog – Multi-Factor Authentication (MFA): Your Critical Second Layer of Defense

Comments
2 min read
Using Fail2Ban to Protect Against Brute Force Attacks
Cover image for Using Fail2Ban to Protect Against Brute Force Attacks

Using Fail2Ban to Protect Against Brute Force Attacks

1
Comments
5 min read
🕰️Become a Timecop with Linux Task Scheduling: at, cron, and crontab

🕰️Become a Timecop with Linux Task Scheduling: at, cron, and crontab

2
Comments
4 min read
Efficient File Management in Linux
Cover image for Efficient File Management in Linux

Efficient File Management in Linux

5
Comments
2 min read
loading...