Be honest: how many times have you felt like spitting in the face of the marketer who dreams up those ridiculous “10–12 hours of battery life” claims? Six or seven is closer to reality—and even then only…
CONTINUE READING 🡒 Category: Unix
Monitor and Control: How to Audit and Track Everything on…
Are you sure you’re on top of everything happening on your system? Maybe you’re already using a monitoring stack like Prometheus or Zabbix, but do you know how to generate your own detailed reports on system and…
CONTINUE READING 🡒 Linux Hardening: Essential Tools for Comprehensive Security Auditing
In this article, we’ll explore the key utilities for Linux hardening—tools for assessing a Linux system’s security posture and validating configurations from an information security perspective. We’ll not only review the tools but also provide practical examples…
CONTINUE READING 🡒 How to Build an Unconventional Raspberry Pi Media Center: A…
In the six years since the Raspberry Pi appeared, countless guides have shown how to turn it into a home media center. The problem is, the classic media-center setup on a Pi is so underwhelming it loses…
CONTINUE READING 🡒 Decoding Ping, Traceroute, and WHOIS Output for Effective Network Troubleshooting
Ping, traceroute, and whois are among the first tools new admins learn. Many people who aren’t network specialists stop there—and that’s a mistake. With the standard toolset you can pull far more information about a problem than…
CONTINUE READING 🡒 Hardware Over the Network: Passthrough USB Devices, GPU, Sound Card,…
In one of our earlier articles, we explored ways to expose all kinds of resources as files and directories—WebDAV, BitTorrent, SSH, and even GPU memory. But what if we want access not to a remote or local…
CONTINUE READING 🡒 Vulnerability Scanning with Kali Linux: Penetration Testing Essentials
Vulnerability scanning is the process of identifying and analyzing critical security weaknesses in a target environment. It’s sometimes referred to as a vulnerability assessment. Vulnerability scanning is a core function of a vulnerability management program focused on…
CONTINUE READING 🡒 Corosync and Pacemaker: Best Practices for Deploying a High‑Availability (HA)…
Getting a service to handle heavy traffic is a challenge every sysadmin runs into sooner or later. It’s best to put high-availability mechanisms in place ahead of time—before critical nodes start failing. In this article, I’ll cover…
CONTINUE READING 🡒 13 Essential Sysadmin Utilities Every System Administrator Should Know
A well-stocked toolbox is what sets a seasoned pro apart from a newbie. And in Linux administration, that toolbox is about as critical as it gets. In this article, we’re not going to cover things like Nagios,…
CONTINUE READING 🡒 Set Up a Private VPN Server for Friends with Telegram…
In this article, I’ll show you not only how to build your own WireGuard-based VPN service, but also how to configure it so all your friends can use it. And if you want, they can even chip…
CONTINUE READING 🡒 Creating a Bootable USB Drive with Arch Linux Live Image
Today, we will create a live USB drive with an Arch Linux installation image. By "live," I mean it will allow you to install and remove programs, modify any files, and save changes while in use. I've…
CONTINUE READING 🡒 Exploring firewalld: A Simple and Powerful Firewall for Linux to…
There are numerous articles dedicated to configuring a firewall using iptables in Linux, and given the topic's popularity, many more are likely to be written. While basic configurations are relatively straightforward, things get complicated with complex networks…
CONTINUE READING 🡒 10 Compelling Reasons to Choose Arch Linux: Embracing Minimalism with…
We felt that writing about installing and configuring Arch Linux was a bit passé and redundant. So, we decided to take a different approach and discuss why this system exists in the first place and why millions…
CONTINUE READING 🡒 Manjaro vs Arch Linux: Why Stick with Arch for Advanced…
The world of Linux desktop systems is incredibly diverse. As of now, Distrowatch.com lists 288 different distributions, each with its own philosophy and area of application. Throughout the history of the rankings, hundreds of distributions have come…
CONTINUE READING 🡒 Hacker’s Toolkit: Essential Tools for Windows and Linux
Live and learn, always collecting useful tools along the way! Following this principle, I've gathered an extensive collection of utilities, and I'd like to share the best with you. Perhaps you'll find something that will be helpful…
CONTINUE READING 🡒 Mastering systemd: Creating Your Own Linux Service
Despite numerous issues and mixed feelings from users, systemd has become the de facto standard in most Linux distributions. It allows you to create a simple service in just a few minutes and a handful of configuration…
CONTINUE READING 🡒 Conducting Forensics on Linux: Memory, Disk, and Network Dumping for…
The first task in digital forensics is data collection, specifically acquiring images of hard drives and RAM, as well as network connection dumps if they might be helpful. In this article, we'll explore what needs to be…
CONTINUE READING 🡒 Run a Full Ubuntu Desktop on Windows 10 with Linux…
It's been over six months since the author wrote the previous article about Windows Subsystem for Linux. During this time, Microsoft released its first major update for Windows 10—the Anniversary Update 1607. With this update, all new…
CONTINUE READING 🡒 Exploring Endless OS: A Package-Free Linux Distribution
What does an average Linux distribution look like? Typically, it's a system assembled like a modular kit from thousands of packages, plus various desktop customizations, possibly its own installer and configuration system. In any case, almost all…
CONTINUE READING 🡒 Understanding the Linux Boot Process: From Power-On to Desktop
The best way to understand how an operating system works is to trace its boot process step by step. It is during this boot process that all the mechanisms that get the OS up and running are…
CONTINUE READING 🡒