Tux Machines

today's howtos

Posted by Roy Schestowitz on Dec 02, 2022

=> today's leftovers | Mozilla Hubs, ChromeOS, and Chrome

How to Check Firewall Logs in Ubuntu

=> ↺ How to Check Firewall Logs in Ubuntu

UFW logs allow users to check for incoming and outgoing packets which also include origin, destination, used protocol, and many other critical details that are crucial for network security.

How to control when daily automatic Ubuntu updates happens

=> ↺ How to control when daily automatic Ubuntu updates happens

In this post, you will learn how to control when daily Ubuntu updates happens. This post although simple is quite useful if you have home test servers.
As we know, Ubuntu 22.04 integrates several important options to automate system updates. This saves sysadmin time and effort.
But not everything is happiness, there are also times when we need to modify some parameters of those updates to avoid some problems that may arise.
Let’s start.

How To Install TinyCP on Ubuntu 20.04 | 22.04 LTS

=> ↺ How To Install TinyCP on Ubuntu 20.04 | 22.04 LTS

This post is about install TinyCP on Ubuntu.
TinyCP is web based control panel for managing linux like systems. It’s is a most popular lightweight control panel, that provides a wide range of features on a Linux system.

Finding suspicious syscalls with the seccomp notifier | Kubernetes

=> ↺ Finding suspicious syscalls with the seccomp notifier | Kubernetes

Debugging software in production is one of the biggest challenges we have to face in our containerized environments. Being able to understand the impact of the available security options, especially when it comes to configuring our deployments, is one of the key aspects to make the default security in Kubernetes stronger. We have all those logging, tracing and metrics data already at hand, but how do we assemble the information they provide into something human readable and actionable?
Seccomp is one of the standard mechanisms to protect a Linux based Kubernetes application from malicious actions by interfering with its system calls. This allows us to restrict the application to a defined set of actionable items, like modifying files or responding to HTTP requests. Linking the knowledge of which set of syscalls is required to, for example, modify a local file, to the actual source code is in the same way non-trivial.

=> gemini.tuxmachines.org

Proxy Information
Original URL
gemini://gemini.tuxmachines.org/n/2022/12/02/today_s_howtos.1.gmi
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
142.299563 milliseconds
Gemini-to-HTML Time
0.609352 milliseconds

This content has been proxied by September (3851b).