Configuration is the first step in building a kernel. There are many ways and various options to choose from. The kernel will generate a .config file at the end of the process and generate a series of ...
I was proudly wearing one of my Salt Stack shirts the other day when my daughter asked me, "What is Salt Stack?" I began by explaining the problem it solved. If you have multiple servers and want to ...
Managing authentication and authorization in a large-scale network is a challenge: the passwords need to be set and rotated every now and then, access to certain configuration settings needs to be ...
Most people assume Linux is secure, and that’s a false assumption. Imagine your laptop is stolen without first being hardened. A thief would probably assume your username is “root” and your password ...
RHEL/CentOS, Fedora, Ubuntu, Debian, and OpenSuse have far more similarities than differences, but choosing the wrong one for the job can make life much harder Unlike most other desktop and server ...
If you depend on secure shell, learn how you can better protect your servers from SSH attacks. If you allow Secure Shell (SSH) connections on your Linux servers, you know those servers can be ...
When you need a Linux system to have a static IP address rather than one that is set dynamically by DHCP, all that's required is some configuration changes and a restart. Follow these steps to make ...