Linux Audit
Linux security and system management blog
Linux security blog
Linux Audit is one of few blogs available that fully dedicated to Linux security. The goal of the blog is to share high-quality articles to explain security concepts and how they apply to Linux systems.
Security topics
- Applying strict file permissions
- Secure the system by hardening systemd services
- Linux kernel features such as capabilities, cgroups, and namespaces
- Monitoring the system using the Linux Audit Framework
- Provide an overview of common Linux commands for system administration
Interested in a particular subject or want to look around? The glossary might be a great start.
Stay up-to-date and the RSS/Atom feed to your RSS reader (e.g. Thunderbird)!
Did you know?
Interesting one-liner
You can quickly go to your home directory
cdLinux has many commands
killWhat is it? kill allows sending a signal to processes
Why use it? process management, free up resources, troubleshooting
See the command page of kill for more details how to use it, available options, and useful one-liners.
Learn more
Also 💙 the command-line or terminal? Have a look at the command-line tips. See the full list of commands covered at this blog.
Latest articles
Rate limit HTTP clients with nginx
Nginx can be configured to rate limit HTTP requests based on the IP address of the client. Learn how to set it up and tune it to your needs.
uname: show basic system information
The uname command is a small utility on Linux systems to show system information. It is usually available by default and easy to use.
head: show first number of lines from a file
The head command is a small utility on Linux systems to show the first 10 or defined number of lines of a file or filter standard input.
pidof: retrieve PID when searching for process names
The Linux command pidof returns the process ID (PID) of a process when searching for it by its name. Useful for command-line tasks and scripting.
lsns: show active Linux namespaces
The lsns command on Linux can be used to show the namespaces that are in use on the system. It may be used for information gathering or troubleshooting.
Frequently Asked Questions
When it comes to Linux, there is so much to ask, like:
- How to find writable files
- How to check if systemd is being used or active
- What is a kernel ring buffer?
Multiple sections within this site cover the frequently asked questions for Linux and Linux security.
- Data processing
- Linux file systems
- Hardware
- Kernel
- Networking
- Package manager
- Processes
- SSH
- System administration
- Systemd
Recent changes
- Linux Audit » Website information
- Website information » Latest changes
- Hardening profiles for systemd » Dovecot hardening profile
- Systemd » Systemd commands
- Systemd » Finding boot logs in systemd journals
- System administration » Linux commands
- Linux commands » systemd-analyze
- Linux commands » getpcaps command
- Linux commands » pmap command
- Linux commands » prtstat command
- Linux commands » head: show first number of lines from a file
- Linux commands » vmstat: system statistics about memory, processes, disks, block IO, CPU, and more
- Linux commands » resolvectl
- Linux commands » pidstat
- Linux commands » apt-file: show information about packages and related files
- Linux commands » pscap command
- Linux commands » getcap command
- Linux commands » setcap command
- Linux commands » basename: strip directory and file extension or suffix from path
- Linux commands » peekfd command
- Linux commands » rev command
- Linux commands » lsfd command
- Linux commands » iftop
- Linux commands » smem
- Linux commands » kill
Topics
Auditing
Inspect your systems with security tools and manually by knowing what to look for.
Most recent changed article (of 60):
› Configuring and auditing Linux systems with Audit daemon
Automation
Save time by learning how to automate manual and repeating tasks.
Most recent changed article (of 12):
› Alternatives to Bastille Linux: system hardening with Lynis
Compliance
Everything related to compliance, such as security auditing and system hardening.
Most recent changed article (of 15):
› Do NOT use Linux hardening checklists for your servers
File systems
Everything about storing data on a file system
Most recent changed article (of 26):
› Linux History: How Dot Files Became Hidden Files
Hardening
Apply defenses to your Linux systems and make them less vulnerable.
Most recent changed article (of 30):
› Do NOT use Linux hardening checklists for your servers
Kernel
Kernel parameters, system calls, and everything related to the core of every Linux system.
Most recent changed article (of 21):
› Linux hardening with sysctl settings
Linux
Everything related to Linux, from the basics of system administration to running services and securing them.
Most recent changed article (of 42):
› Password Security with Linux /etc/shadow file
Lynis
Tips and insights in using this security tool.
Most recent changed article (of 26):
› The Non-Technical Changelog: Insights of 6 Months Development
Network
Network tuning and finding out why things are slow. Hint: it’s DNS.
Most recent changed article (of 26):
› How to clear the ARP cache on Linux?
Software
Configure, maintain, and monitor software applications
Most recent changed article (of 38):
› Alternatives to Bastille Linux: system hardening with Lynis
SSH
Hardening the SSH server and making smart use of SSH client options.
Most recent changed article (of 19):
› How to find the OpenSSH version
System administration
Learn generic Linux and security concepts with the articles in our system administrator category
Most recent changed article (of 265):
› Systemd commands
Vulnerabilities
Know what vulnerabilities could be present on your systems and how to harden your Linux environment.
Most recent changed article (of 12):
› How to solve Shellshock on Debian and Ubuntu
Web
Let’s build a better web together
Most recent changed article (of 25):
› Hardening nginx with systemd security features