Skip to the content
Both.org
News, Opinion, Tutorials, and Community for Linux Users and SysAdmins
  • About Us
  • Moving to Linux in the Triangle area
  • Linux
    • Why I use Linux
    • The real reason we use Linux
  • My Linux Books
    • systemd for Linux SysAdmins
    • Using and Administering Linux – Zero to SysAdmin: 2nd Edition
    • The Linux Philosophy for SysAdmins
    • Linux for Small Business Owners
    • Errata
      • Errata for The Linux Philosophy for SysAdmins
      • Errata for Using and Administering Linux — 1st Edition
      • Errata for Using and Administering Linux — 2nd Edition
  • Open Source Resources
    • What is Open Source?
    • What is Linux?
    • What is Open Source Software?
    • The Open Source Way
  • Write for us
    • Submission and Style guide
    • Advertising statement
  • Downloads
1

Minty Fresh on a Meerkat: My Latest Linux Setup

September 15, 2025September 10, 2025
2

My start with BASIC programming

September 12, 2025September 8, 2025
3

Read long lines with getline

September 11, 2025September 8, 2025
4

Rhythmbox is a great music player for GNOME

September 10, 2025September 8, 2025
5

Reading the command line with getopt

September 9, 2025September 8, 2025
6

How do I choose a Linux distribution?

September 5, 2025September 5, 2025
7

Using QGIS and MerginMaps for Geospatial Data Work

September 4, 2025September 3, 2025
8

Exploring GNU Algol 68: Formatting numbers as strings for output

September 3, 2025September 2, 2025
9

What you need to know when you buy a new computer

September 2, 2025September 2, 2025
  • Home
  • Security

Tag: Security

Getting Started Linux Security SELinux SysAdmin System Administration

Getting Started with SELinux

SELinux was developed by the NSA to provide a highly secure computing environment. True to the GPL, they have made this code available to the rest of the Linux community and it is included as part of nearly every mainstream distribution.

David Both
July 15, 2025July 13, 2025
Read More
CVE Linux Security Vulnerability

New Linux vulnerabilities allow access to critical data

Two new vulnerabilities in the core dump handlers for Ubuntu, RHEL, and Fedora, allow access to critical data according to The Hacker News. The problem...

David Both
June 1, 2025
Read More
CVE Linux Security

Linux and Security

Image via Creative Commons, modified by Both.org Security is a critically important part of using and administering computers in our ultra-connected world. With Linux running...

David Both
May 23, 2025
Read More
FAIL! Fedora Linux Security Updates

Beware Fedora updates of April 28, 2025

It breaks iptables with no warning I'm rather angry right now but I promise to remain calm -- at least in this post. I just...

David Both
April 28, 2025May 9, 2025
Read More
Linux Security

How I create encrypted passwords

I sometimes need to create an encrypted password for use in scripts when adding one or more new user accounts to hosts in my lab....

David Both
December 14, 2024December 12, 2024
Read More
Linux Security System Administration

Secure electronic document disposal with Linux

We can't be too careful about ensuring that our personal data is safe, both paper documents and electronic ones. I'm sure I don't need to...

David Both
September 21, 2024September 21, 2024
Read More
Fun Linux Opinion

Why I Use Linux

I use Linux for many reasons. These best reasons may help you understand why..

David Both
July 16, 2024August 9, 2024
Read More
Anti-Malware In Depth Linux Security

Linux Malware scanning using ClamAV

Image via Creative Commons, modified by Both.org Introduction There are many different ways of protecting a system, right from keeping the software up-to-date, to removing...

Gaurav Kamathe
July 7, 2024July 1, 2024
Read More
Command Line File Management In Depth Linux Security

Intro to the Linux chown command

Image by: Opensource.com CC-by-SA 4.0 Every file and directory on a Linux system is owned by someone, and the owner has complete control to change...

Alan Formy-Duval
June 25, 2024June 16, 2024
Read More
Digital Images Linux Privacy

Protecting Your Privacy: Removing Exif Metadata from Your Digital Images with ExifCleaner

Each picture you take with a digital camera contains numerous tags that provide a great deal of information, some of which might ordinarily be considered confidential.

Don Watkins
March 5, 2024March 5, 2024
Read More

Random Quote

Those who don’t understand Unix are condemned to reinvent it, poorly.

— Henry Spencer

End of 10...

  • End of 10…

Links: Humor

  • Linux: A true story

Links: Interesting info

  • Replace Kubernetes with systemd

Links: Linux

  • Fedora
  • KDE for W10 Exiles
  • Linux Mint
  • Ubuntu

Links: Moving to Linux

  • 7 Reasons Fedora Might Be a Better Windows Replacement Than Linux Mint
  • Best Linux distros to try before Windows 10 support ends
  • Isn’t It Time to Switch to Linux? 12 Reasons to Abandon Windows
  • KDE for W10 Exiles
  • Linux: A true story
  • Why I Switched to Linux From Windows

Links: Open Source Software

  • GIMP
  • LibreOffice

“systemd for SysAdmins” Now Available

May 13,2025

My latest book — a #1 New Release on Amazon — “systemd for Linux  SysAdmins” is now available from my publisher, Apress, and on Amazon.

2nd Edition now Available

All three volumes of this best-selling second edition of my Linux Self-Study course are now available from Apress and Amazon. See the details of this 3-volume self-study course.

Technically We Write — Our Partner Site

Our partner site, Technically We Write, has published a number of articles from several contributors to Both.org. Check them out.

Technically We Write is a community of technical writers, technical editors, copyeditors, web content writers, and all other roles in technical communication.

Subscribe to Both.org

To comment on articles, you must register.

Send your desired user ID, first and last name, and an email address for login (this must be the same email address used to register) to subscribe@both.org with “Subscribe” as the subject line.

You’ll receive a confirmation of your subscription with your initial password as soon as we are able to process it.

Administration

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
  • About Us
  • Moving to Linux in the Triangle area
  • Linux
    • Why I use Linux
    • The real reason we use Linux
  • My Linux Books
    • systemd for Linux SysAdmins
    • Using and Administering Linux – Zero to SysAdmin: 2nd Edition
    • The Linux Philosophy for SysAdmins
    • Linux for Small Business Owners
    • Errata
      • Errata for The Linux Philosophy for SysAdmins
      • Errata for Using and Administering Linux — 1st Edition
      • Errata for Using and Administering Linux — 2nd Edition
  • Open Source Resources
    • What is Open Source?
    • What is Linux?
    • What is Open Source Software?
    • The Open Source Way
  • Write for us
    • Submission and Style guide
    • Advertising statement
  • Downloads

Advertising Statement

Advertising Statement

To the Top ↑ Up ↑