Upgrading glibc for the GHOST Vulnerability

Upgrading glibc for the GHOST Vulnerability GHOST is a vulnerability that was announced on January 27th 2015, which affects the glibc library on Linux systems. This vulnerability affects all Linux... Read more

Learn How to Set Your $PATH Variables Permanently in Linux

In Linux (also UNIX) $PATH is environment variable, used to tell the shell where to look for executable files. $PATH variable provides great flexibility and security to the Linux systems and... Read more

Create a Self-Signed TLS Certificate

Create a Self-Signed TLS Certificate What is a Self-Signed TLS Certificate? Self-signed TLS certificates are suitable for personal use or for applications that are used internally within an organization. If... Read more

Mitigating memcached Amplification Attacks

Mitigating memcached Amplification Attacks What is Memcrashed? Recently there has been a significant increase in large-scale UDP reflection and amplification attacks across the internet. These attacks were all using the... Read more

A Linux Sysadmin’s Guide to Network Management, Troubleshooting and Debugging

A system administrator’s routine tasks include configuring, maintaining, troubleshooting, and managing servers and networks within data centers. There are numerous tools and utilities in Linux designed for the administrative purposes.... Read more

How to Configure a Firewall with UFW

How to Configure a Firewall with UFW What is UFW? UFW, or uncomplicated firewall, is a frontend for managing firewall rules in Arch Linux, Debian or Ubuntu. UFW is used... Read more

Bash ShellShock – The Best Ways to Check if You Are Vulnerable.

 How to check your servers for Bash ShellShock (CVE-2014-6271, CVE-2014-7169) ShellShock, what a fitting name. The latest major headache for Sys Admins, Developers…well pretty much anyone who has a*nix system... Read more

How to Transfer Files Between Two Computers using nc and pv Commands

Hi fellow Linux readers, I’m bringing you yet another great article from our Linux Tips and Tricks series, this time we will be using two lesser known Linux utilities that... Read more

How to Use GPG Keys to Send Encrypted Messages

How to Use GPG Keys to Send Encrypted Messages What is GnuPG? GNU Privacy Guard (GnuPG), also known as GPG, is a tool for secure communication that was created by... Read more

Download a Local Copy of your Linode Backup

Download a Local Copy of your Linode Backup The Linode Backups service can create automatic and manual snapshots of your Linode. A completed backup can be directly restored to the... Read more