Last change: 2025-01-06
Looking for all DNS requests made on a Linux system? Tools like dnstop, firejail, and tcpdump can help to find what is being queried.
Last change: 2025-01-06
Looking for all DNS requests made on a Linux system? Tools like dnstop, firejail, and tcpdump can help to find what is being queried.
Last change: 2025-01-10
The command apt-file can help with discovering which files belong to a package or what package installed or provides them. Learn which options to use.
Last change: 2025-01-10
The command smem can help showing memory usage, including the usage of swap. Here are the most common options explained.
Last change: 2025-01-10
The command iftop shows ongoing bandwidth usage on one or more network interfaces and is a great tool for troubleshooting network issues.
Last change: 2025-01-10
Linux systems may use the pidstat command to retrieve system information such as details about CPU, memory, and disk activity by processes.
Last change: 2025-01-06
Your Linux systems should be protected against common security attacks. By using 4 common techniques, we can fortify our systems like a real fortress.
Last change: 2025-01-06
The PCI DSS standard defines Creation and deletion of system-level objects. For Linux systems this might be handled with the Linux audit framework.
Last change: 2025-01-06
Learn how to protect your Linux system against malware, such as implementing security measures like file integrity monitoring and malware scanning.
Last change: 2025-01-06
Protecting against file system changes is an important step in keeping your systems secure. Prevention is important, but detection might be more valuable!