Tux Machines
Posted by Roy Schestowitz on Jan 16, 2023
=> Security Leftovers | Today in Techrights
=> ↺ How to Install Brave Browser on Rocky Linux EL9 or EL8
Installing Brave browser is a relatively straightforward process for Rocky Linux users. This guide describes the steps to install the browser easily from the official Brave RPM repositories if you are running either Rocky Linux 8 or Rocky Linux 9. With Brave browser, you can browse websites with greater privacy and security with its built-in ad-blocking feature and tracker blockers enabled by default. As it is based on Chromium, Brave also supports most Chrome extensions.
=> ↺ How to Install PHP 8.2, 8.1, 8.0, 7.4 on Rocky Linux EL9 or EL8
With PHP being a popular language for web development, Rocky Linux 9 and 8 now offer the ability to install multiple versions on your system with the Remi PHP repository. The versions available include 8.2, 8.1, 8.0, and 7.4 – all offered with their open-source nature, allowing them to integrate seamlessly into various servers, databases & technologies! With this guide, you can also learn how to ensure they are installed properly on your Rocky Linux system.
=> ↺ Harden Kubernetes cluster with pod and container security contexts
When it comes to security in Kubernetes, it is vital to secure the individual resources of the cluster. Pods and containers are considered the core resources running in the cluster and are the fundamental building block of Kubernetes workloads. Applying security to the pod and container layer can have a huge impact on the overall security of your cluster.
By default, Kubernetes pods have root access. Running k8s pods with root or as a privileged user can be very harmful to the host file system for a number of reasons. It can give the attackers the ability to escape out of the pod or container boundaries and get unconstrained access to the host. Security contexts allow you to control what types of access your pods have and accordingly run the pods inside your K8s cluster in a secure manner. In this blog post, we’ll demonstrate how to harden your Kubernetes cluster through security contexts and apply them to pods and containers.
=> ↺ Linux Top Command with Examples
In Linux systems, the “top” command reports the valuable system information like running processes and resource usage. It shows the processor activity and kernel-managed tasks in real time. It’s one of the staple tools for system administrators.
=> ↺ How to Check User’s Failed Login Attempts in Linux
Recently, we wrote a detailed article on how to check a user’s login history in Linux to track user activity for a particular investigation.
Unfortunately, the command mentioned in that article can’t show the log of a user’s failed login attempt; it only shows the log of a successful login attempt.
And, as someone who has worked in this industry for a decade, I can confidently state that the most important evidence we capture from users failed login attempts
So, stick with this article to learn how to check a user’s failed login attempt on the server using the lastb command.
=> ↺ Compare Two Directories in the Linux Command Line
How do you compare two files in Linux? You use the diff command.
But how do you compare two folders in Linux? You still use the diff command.
It is easier to visualize the difference between two directories using a GUI tool.
In this tutorial, I'll share how you can use the diff command to compare directories. I will also discuss a GUI tool called Meld.
=> ↺ How to Copy Files to a USB Flash Drive Using the Terminal [TTY] - TREND OCEANS
Need help copying files from your USB to the system using a terminal? Learn it with this easy step-by-step guide!
=> gemini.tuxmachines.org This content has been proxied by September (ba2dc).Proxy Information
text/gemini;lang=en-GB