Skip to the content
Both.org
News, Opinion, Tutorials, and Community for Linux Users and SysAdmins
  • About Us
  • End of 10 Events
    • Wake Forest, NC, — 2025-09-20
  • Linux
    • Why I use Linux
    • The real reason we use Linux
  • My Linux Books
    • systemd for Linux SysAdmins
    • Using and Administering Linux – Zero to SysAdmin: 2nd Edition
    • The Linux Philosophy for SysAdmins
    • Linux for Small Business Owners
    • Errata
      • Errata for The Linux Philosophy for SysAdmins
      • Errata for Using and Administering Linux — 1st Edition
      • Errata for Using and Administering Linux — 2nd Edition
  • Open Source Resources
    • What is Open Source?
    • What is Linux?
    • What is Open Source Software?
    • The Open Source Way
  • Write for us
    • Submission and Style guide
    • Advertising statement
  • Downloads
1

Read and write data in C

October 30, 2025September 26, 2025
2

First Look at Fedora 43

October 29, 2025
3

Fedora 43 Released

October 28, 2025October 28, 2025
4

Why I love Cool Retro Term

October 28, 2025October 25, 2025
5

Fedora 43 set for release October 28, 2025

October 27, 2025
6

Setting up OBS Studio to record videos

October 27, 2025October 17, 2025
7

Free Office Software That Works

October 24, 2025October 23, 2025
8

Empowering Communities with WordPress:

October 23, 2025October 21, 2025
9

Why Linux Is the Hidden Engine Behind Modern Tech

October 22, 2025October 21, 2025
  • Home
  • Security

Tag: Security

Linux Security System Administration

A caution about using sudo

This example shows why it is important that users should not be able to edit scripts that they can run with sudo.

Jim Hall
October 14, 2025October 11, 2025
Read More
Linux Security System Administration Tips

Rethinking su vs sudo

If you've been hanging around Both.org for a while, you've undoubtedly noticed that I much prefer using the su - command to obtain elevated privileges...

David Both
October 13, 2025October 11, 2025
Read More
Getting Started Linux Security SELinux SysAdmin System Administration

Getting Started with SELinux

SELinux was developed by the NSA to provide a highly secure computing environment. True to the GPL, they have made this code available to the rest of the Linux community and it is included as part of nearly every mainstream distribution.

David Both
July 15, 2025July 13, 2025
Read More
CVE Linux Security Vulnerability

New Linux vulnerabilities allow access to critical data

Two new vulnerabilities in the core dump handlers for Ubuntu, RHEL, and Fedora, allow access to critical data according to The Hacker News. The problem...

David Both
June 1, 2025
Read More
CVE Linux Security

Linux and Security

Image via Creative Commons, modified by Both.org Security is a critically important part of using and administering computers in our ultra-connected world. With Linux running...

David Both
May 23, 2025
Read More
FAIL! Fedora Linux Security Updates

Beware Fedora updates of April 28, 2025

It breaks iptables with no warning I'm rather angry right now but I promise to remain calm -- at least in this post. I just...

David Both
April 28, 2025May 9, 2025
Read More
Linux Security

How I create encrypted passwords

I sometimes need to create an encrypted password for use in scripts when adding one or more new user accounts to hosts in my lab....

David Both
December 14, 2024December 12, 2024
Read More
Linux Security System Administration

Secure electronic document disposal with Linux

We can't be too careful about ensuring that our personal data is safe, both paper documents and electronic ones. I'm sure I don't need to...

David Both
September 21, 2024September 21, 2024
Read More
Fun Linux Opinion

Why I Use Linux

I use Linux for many reasons. These best reasons may help you understand why..

David Both
July 16, 2024August 9, 2024
Read More
Anti-Malware In Depth Linux Security

Linux Malware scanning using ClamAV

Image via Creative Commons, modified by Both.org Introduction There are many different ways of protecting a system, right from keeping the software up-to-date, to removing...

Gaurav Kamathe
July 7, 2024July 1, 2024
Read More
Command Line File Management In Depth Linux Security

Intro to the Linux chown command

Image by: Opensource.com CC-by-SA 4.0 Every file and directory on a Linux system is owned by someone, and the owner has complete control to change...

Alan Formy-Duval
June 25, 2024June 16, 2024
Read More
Digital Images Linux Privacy

Protecting Your Privacy: Removing Exif Metadata from Your Digital Images with ExifCleaner

Each picture you take with a digital camera contains numerous tags that provide a great deal of information, some of which might ordinarily be considered confidential.

Don Watkins
March 5, 2024March 5, 2024
Read More

Random Quote

Beauty is more important in computing than anywhere else in technology because software is so complicated. Beauty is the ultimate defense against complexity.

— David Gelernter

End of 10...

  • End of 10…

Links: Humor

  • Linux: A true story

Links: Interesting info

  • Replace Kubernetes with systemd

Links: Linux

  • Fedora
  • KDE for W10 Exiles
  • Linux Mint
  • Ubuntu

Links: Moving to Linux

  • 7 Reasons Fedora Might Be a Better Windows Replacement Than Linux Mint
  • 7 Reasons Why Windows Users Avoid Linux (Which Aren’t True Anymore)
  • Best Linux distros to try before Windows 10 support ends
  • How to switch your Windows 10 PC to Linux Mint – for free
  • Isn’t It Time to Switch to Linux? 12 Reasons to Abandon Windows
  • KDE for W10 Exiles
  • Linux: A true story
  • Why Denmark is dumping Microsoft Office and Windows for LibreOffice and Linux
  • Why I Switched to Linux From Windows

Links: Open Source Software

  • GIMP
  • LibreOffice

“systemd for SysAdmins” Now Available

May 13,2025

My latest book — a #1 New Release on Amazon — “systemd for Linux  SysAdmins” is now available from my publisher, Apress, and on Amazon.

2nd Edition now Available

All three volumes of this best-selling second edition of my Linux Self-Study course are now available from Apress and Amazon. See the details of this 3-volume self-study course.

Technically We Write — Our Partner Site

Our partner site, Technically We Write, has published a number of articles from several contributors to Both.org. Check them out.

Technically We Write is a community of technical writers, technical editors, copyeditors, web content writers, and all other roles in technical communication.

Subscribe to Both.org

To comment on articles, you must register.

Send your desired user ID, first and last name, and an email address for login (this must be the same email address used to register) to subscribe@both.org with “Subscribe” as the subject line.

You’ll receive a confirmation of your subscription with your initial password as soon as we are able to process it.

Administration

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
  • About Us
  • End of 10 Events
    • Wake Forest, NC, — 2025-09-20
  • Linux
    • Why I use Linux
    • The real reason we use Linux
  • My Linux Books
    • systemd for Linux SysAdmins
    • Using and Administering Linux – Zero to SysAdmin: 2nd Edition
    • The Linux Philosophy for SysAdmins
    • Linux for Small Business Owners
    • Errata
      • Errata for The Linux Philosophy for SysAdmins
      • Errata for Using and Administering Linux — 1st Edition
      • Errata for Using and Administering Linux — 2nd Edition
  • Open Source Resources
    • What is Open Source?
    • What is Linux?
    • What is Open Source Software?
    • The Open Source Way
  • Write for us
    • Submission and Style guide
    • Advertising statement
  • Downloads

Advertising Statement

Advertising Statement

To the Top ↑ Up ↑