Extend the life of your Linux SSD drive with fstrim
SSDs have benefits like silent and cooler operation and a faster interface spec, compared to their elder spinning ancestors. Of course, new technology brings with it new methods of maintenance and management. SSDs have a feature to reclaim unused blocks on the device.
NetworkManager on Linux: #3 — How I migrated to NetworkManager Connection Files for configuration
Interface configuration files may not be supported in Fedora much longer, but migrating to NetworkManager is easier than you might think.
An introduction to GRUB2 configuration for your Linux machine
Learn how the GRUB boot loader works to prepare your system and launch your operating system kernel.
NetworkManager on Linux: #2 — A sysadmin’s guide to network interface configuration files
Simplify the complex world of interface configuration files with this handy tutorial.
A Linux networking guide to CIDR notation and configuration
One of the key concepts in network routing that any Linux professional should be familiar with is network notation. CIDR stands for Classless-Inter Domain Routing; it defines a notation methodology for network addressing that is used to specify the network portion of an IP address.
NetworkManager on Linux: #1 — Getting Started
Most current Linux distributions use NetworkManager for creating and managing network connections. Learn what NetworkManager is and how to use it to view network connections and devices for Linux hosts.
An introduction to Linux network routing
Every computer attached to a network requires some type of routing instructions for network TCP/IP packets when they leave the local host. This is usually very straightforward because most network environments are very simple and there are only two options for departing packets.
But that’s not always the case. Learn how to create a router with your Linux computer.
How to use udev
Udev is flexible but complex. Learn how to use udev so you can customize how Linux recognizes your devices.
Use lspci on Linux to see your hardware
Sometimes you need to identify the hardware in a system. One command used for this is lspci.
Introduction to the Domain Name System (DNS)
Learn how the global DNS system makes it possible for us to assign memorable names to the worldwide network of machines we connect to every day.
Use rclone to put your files in the cloud
There are lots of third party applications out there that purport to solve my sharing-with-the-cloud problem. I chose Rclone – an open source command-line program that can be used to copy files between computer file systems and the cloud, providing backup, restore, duplication, one-way and bi-directional synchronization and even “file streaming” – making a folder appear virtually in your physical filesystem. Not just with Google Drive, but with all sorts of cloud providers, both proprietary and open source.
Is Linux Really Secure?
On March 29 of 2024, a security vulnerability was reported against the XZ library as CVE-2024-3094. This vulnerability creates what is known as a backdoor — a known and easy means for CR4CK3R$ to access infected systems and use them for malicious purposes. Considering this, is Linux really more secure than Windows? Is it secure at all?
Tweak your system performance with ‘noatime’
Turn off “access time” to make a slight but noticeable improvement on system performance.
An introduction to the Linux boot and startup processes with GPT and GRUB2
Ever wondered what it takes to get your system ready to run applications? Here’s what is going on under the hood.
How I boot FreeDOS using QEMU
QEMU is a fast and flexible virtual machine that you configure using command line options.
The real differences between less, more, and most
Find out what sets these famous Linux pagers apart from one another, and how to choose the right one for your system.