Linux Audit

Linux security and system management

Linux Audit is one of the few blogs dedicated to Linux security. We aim for high-quality articles to explain security concepts and how they apply to Linux systems.

Did you know?

The ps command can sort by a specific column

ps --sort=-pcpu -eo pcpu,pid,user,args | head -n 10

Also 💙 the command-line or terminal? Have a look at the command-line tips.

Latest articles

How to find symbolic links that point to a directory

Learn how to use the find command to discover symbolic links that refer to a directory.

How to compare two directories and find the differences

Learn how to compare two directories and see their differences or what files they are having in common.

Monitoring USB communications using usbmon interface

An overview of the differences between firewall technologies iptables and nftables. We highlight the major differences like simplicity and management.

/etc/ssh/sshd_config

The configuration file /etc/ssh/sshd_config contains settings from the OpenSSH server daemon. Learn more about this file and how it can be tested and configured.

Systemd timers

Learn about systemd timers, the unit type for scheduled tasks and how it differs from cron.

Recent changes

Using a RSS feed reader? See links in footer to stay up-to-date!

Topics

Auditing

Inspect your systems with security tools and manually by knowing what to look for.

Latest article (of 59):
How to secure a Linux system

Auditing »

Automation

Save time by learning how to automate manual and repeating tasks.

Latest article (of 12):
Shell scripting

Automation »

Compliance

Everything related to compliance, such as security auditing and system hardening.

Latest article (of 15):
GDPR Compliance: Technical Requirements for Linux Systems

Compliance »

File systems

Everything about storing data on a file system

Latest article (of 14):
How to find symbolic links that point to a directory

File systems »

Hardening

Apply defenses to your Linux systems and make them less vulnerable.

Latest article (of 30):
How to secure a Linux system

Hardening »

Linux

Everything related to Linux, from the basics of system administration to running services and securing them.

Latest article (of 37):
How to block POST requests in nginx

Linux »

Software

Configure, maintain, and monitor software applications

Latest article (of 32):
How to show all installed packages on Ubuntu

Software »

System administration

Learn generic Linux and security concepts with the articles in our system administrator category

Latest article (of 116):
How to find symbolic links that point to a directory

System administration »

Vulnerabilities

Know what vulnerabilities could be present on your systems and how to harden your Linux environment.

Latest article (of 12):
Show vulnerable packages on Arch Linux with arch-audit

Vulnerabilities »

Web

Let’s build a better web together

Latest article (of 22):
Test web server caching with curl

Web »