Monitoring

Apt-file

The command apt-file can help with discovering which files belong to a package or what package installed or provides them. Learn which options to use.

Smem

The command smem can help showing memory usage, including the usage of swap. Here are the most common options explained.

Iftop

The command iftop shows ongoing bandwidth usage on one or more network interfaces and is a great tool for troubleshooting network issues.

Security Defenses to Fortify your Linux Systems

Your Linux systems should be protected against common security attacks. By using 4 common techniques, we can fortify our systems like a real fortress.

PCI DSS Linux: Creation and deletion of system-level objects

The PCI DSS standard defines Creation and deletion of system-level objects. For Linux systems this might be handled with the Linux audit framework.

Monitoring Linux Systems for Rootkits

Learn how to protect your Linux system against malware, such as implementing security measures like file integrity monitoring and malware scanning.

Monitor for File System Changes on Linux

Protecting against file system changes is an important step in keeping your systems secure. Prevention is important, but detection might be more valuable!