Monitoring
Apt-file
The command apt-file can help with discovering which files belong to a package or what package installed or provides them. Learn which options to use.
Smem
The command smem can help showing memory usage, including the usage of swap. Here are the most common options explained.
Iftop
The command iftop shows ongoing bandwidth usage on one or more network interfaces and is a great tool for troubleshooting network issues.
Security Defenses to Fortify your Linux Systems
Your Linux systems should be protected against common security attacks. By using 4 common techniques, we can fortify our systems like a real fortress.
PCI DSS Linux: Creation and deletion of system-level objects
The PCI DSS standard defines Creation and deletion of system-level objects. For Linux systems this might be handled with the Linux audit framework.
Monitoring Linux Systems for Rootkits
Learn how to protect your Linux system against malware, such as implementing security measures like file integrity monitoring and malware scanning.
Monitor for File System Changes on Linux
Protecting against file system changes is an important step in keeping your systems secure. Prevention is important, but detection might be more valuable!