Linux
Learn Linux administration, commands, and open-source technologies
Navigate through content by publication date
Wed, May 20
21 items found
Linux/Unix domain-joined computer objects with PasswordNeverExpires=True — expected behavior or should I remediate?
Running an AD Health Assessment on our Windows 2019 forest and it flags ~40 Linux/Unix computer accounts as `PasswordNeverExpires=True` (userAccountControl bit 65536 set). Before I blindly clear the flag, I want to understand what's actually going on. **Environment:** - Mixed Linux estate: RHEL 7/8/9, Ubuntu, some legacy CentOS, plus NetApp/QNAP appliances - Join methods vary: `realm join` (SSSD), Samba/Winbind, some old Centrify leftovers - Some boxes have `PasswordLastSet` going back 5+ ye
How to Secure Your Linux Server in 10 Steps
How to Secure Your Linux Server in 10 Steps Introduction How to Secure Your Linux Server in 10 Steps is essential knowledge for every developer. Key Points Start with the basics Practice regularly Build real projects Share your knowledge Getting Started The best way to learn is by doing. Set up a test environment and experiment. Best Practices Follow official documentation Join community forums Contribute to open source Write about what you ...
The Last Distro Standing Challenge: Find Your Perfect Linux Distro!
Are you a Linux distro hopper? Finding the right Linux distribution can feel overwhelming with so many great options available — but it doesn’t have to be. In this video, I’ll walk you through the Last Distro Standing Challenge, a simple method designed to help you systematically test Linux distros head-to-head until only one remains: your new primary Linux distribution. Using a multi-boot USB flash drive powered by Ventoy, you can boot into multiple Linux distros without ever touching your mai
Fedora Retiring Its Deepin Desktop Packages
A year after SUSE decided to remove its Deepin desktop packages over ongoing security concerns, Fedora Linux is now also removing their Deepin packages over similar concerns and lack of activity in maintaining the packages...
Greg KH Calls For More Rust Linux Developers
Greg Kroah-Hartman took time away from his duties as Linux's second-in-command as stable maintainer, various subsystem maintainer, and recent hobby of using AI/LLMs for uncovering Linux kernel bugs to present at the Rust Week conference...
Patches Trying To Bring Mainline Linux Support For The Infineon/Intel XMM6260 Modem
While it has been nearly seven years since Apple acquired the Intel Mobile Communications' smartphone modem business and fifteen years since Intel acquired the wireless solutions division of Infineon, in 2026 we might see mainline Linux kernel support for the out-of-date XMM6260 modem...
CVE-2026-42945: How to Audit and Patch the NGINX Rift Vulnerability
I break down the critical NGINX Rift vulnerability (CVE-2026-42945) affecting the rewrite module on Linux. Learn how to recursively audit your server configuration files for vulnerable rewrite patterns, implement immediate configuration mitigations using PCRE named capture groups, and successfully upgrade your active NGINX packages to the secure version 1.30.1 today.
Kernel 7.0.9 Rolling Out: The Emergency Security Clean-up
I explore the emergency Kernel 7.0.9 release to patch the Fragnesia (CVE-2026-46300) and Dirty Frag LPE flaws. In this guide, I show you how to audit your systems across Fedora, Ubuntu, and Arch Linux, and how to verify active modprobe blocklist workarounds on your production servers without rebooting the systems immediately.
[$] openSUSE "terms of site" raise complaints about age restrictions
Many people in the Linux community began using the operating system—and contributing to open source—at a tender age, often well before their 16th birthday. Thus, a recent change in openSUSE's terms of site (ToS) that required users of the project's web site to be "at least 16 years of age or the age of majority" in their jurisdiction has raised objections. The terms have since been modified, though users must still have parental approval to create accounts if they are younger than...
[$] The tenth OpenPGP email summit
The OpenPGP Email Summit is an annual meeting for those who work on encrypted email and related topics. The tenth installment of this meeting took place in March 2026 and the minutes have now been published. As usual, a wide range of topics were discussed. Highlights included support for post-quantum cryptography (PQC) with multiple actors planning rollouts within this year, a promising new approach for making email signatures ubiquitous with the plan of making OpenPGP signed email a default,...
CVE-2026-46333 (ssh-keysign-pwn) Linux kernel vulnerability mitigations
An information disclosure security vulnerability in the Linux kernel was publicly disclosed on May 15th, 2026. The vulnerability was reported by Qualys and fixed in the mainline Linux kernel tree. A proof-of-concept exploit was published soon after public disclosure. The ID CVE-2026-46333 was assigned, but the vulnerability is also referred to as “ssh-keysign-pwn”, based on […]
A look into Ubuntu Core 26: Cloud-powered edge computing with AWS IoT Greengrass and Azure IoT Edge
Welcome to this blog series which explores innovative uses of Ubuntu Core. Throughout this series, Canonical’s Engineers will show what you can build with this Core 26 release, highlighting the features and tools available to you. In this first blog, Michael Croft-White, Engineer Director for Canonical’s Telemetry team, will show you how Ubuntu Core integrates […]
Red Hat Enterprise Linux 10.2 and 9.8 are here: The intelligent evolution of enterprise Linux
Red Hat Enterprise Linux (RHEL) 10.2 and 9.8 are here, evolving the operating system from a foundation to a powerful engine for critical applications, security, and innovation. These updates enhance the core strengths of RHEL to help IT leaders, developers, and administrators accelerate time-to-market, simplify hybrid cloud management, and proactively defend against advanced threats, including quantum computing risks. This integrated strategy enables your organization to innovate, simplify, p...
How to Secure Your Linux Server in 10 Steps
How to Secure Your Linux Server in 10 Steps Introduction How to Secure Your Linux Server in 10 Steps is essential knowledge for every developer. Key Points Start with the basics Practice regularly Build real projects Share your knowledge Getting Started The best way to learn is by doing. Set up a test environment and experiment. Best Practices Follow official documentation Join community forums Contribute to open source Write about what you ...
I Built a Hacking Home Lab for ₹0 — Here’s My Exact Cybersecurity Setup
Six months ago I thought ethical hacking required expensive hardware, paid labs, and powerful systems. I was wrong. I built a complete cybersecurity home lab using an old laptop, free tools, VirtualBox, Kali Linux, and intentionally vulnerable applications — all for ₹0. In this post I explain: My exact setup Mistakes I made Free tools I used Network architecture Safe practice environments Beginner roadmap for learning penetration testing Read full guide: (https://apisecurityguide.blogspot....
Encrypt Once, Boot Forever: TPM2 Auto-Unlock on Fedora 44
When I set up Fedora 44 on my Predator Helios Neo 16, I enabled full disk encryption using LUKS. Non-negotiable for a cybersecurity student. The problem: every boot starts with a password prompt before anything loads. Fine in principle, friction in practice — especially when you're rebooting frequently during a fresh system setup. The solution: seal the decryption key inside the TPM chip and let the hardware unlock the drive automatically on legitimate boots. No password prompt, full encryp...
Hardening a Linux Server in the Real World: Firewall, SSH, Fail2Ban, Nginx, Docker, .env Protection, and Bot Forensics
Every public server becomes part of the internet’s background noise very quickly. That was not obvious to me in the same way until I started watching production traffic closely. I was not only seeing normal users, crawlers, and health checks. I was also seeing bots probing predictable paths: /.env /.env.production /backup/.env /wp/.env /magento/.env /api/v2/.env /gateway/.env /vendor/.env /storage/.env /.git/config /credentials.json /service-account.json /__env.js /actuator/env /admin/php...
Blocking Adult Content at the Proxy Layer: Mandatory HTTPS Enforcement, Category Filtering, and Always-On VPN
DNS-based adult content filtering is the most commonly recommended approach and the least reliable technically. Here is why it fails and how to implement proxy-layer filtering that cannot be bypassed with a DNS settings change. Why DNS filtering fails for adult content blocking DNS filtering intercepts name resolution queries and returns NXDOMAIN for blocked domains. Three bypass vectors make it unreliable: 1. Manual DNS override (30 seconds, no technical knowledge required): ...
How to Secure Your Linux Server in 10 Steps
How to Secure Your Linux Server in 10 Steps Introduction How to Secure Your Linux Server in 10 Steps is essential knowledge for every developer. Key Points Start with the basics Practice regularly Build real projects Share your knowledge Getting Started The best way to learn is by doing. Set up a test environment and experiment. Best Practices Follow official documentation Join community forums Contribute to open source Write about what you ...
How to Secure Your Linux Server in 10 Steps
How to Secure Your Linux Server in 10 Steps Introduction How to Secure Your Linux Server in 10 Steps is essential knowledge for every developer. Key Points Start with the basics Practice regularly Build real projects Share your knowledge Getting Started The best way to learn is by doing. Set up a test environment and experiment. Best Practices Follow official documentation Join community forums Contribute to open source Write about what you ...
How to Secure Your Linux Server in 10 Steps
How to Secure Your Linux Server in 10 Steps Introduction How to Secure Your Linux Server in 10 Steps is essential knowledge for every developer. Key Points Start with the basics Practice regularly Build real projects Share your knowledge Getting Started The best way to learn is by doing. Set up a test environment and experiment. Best Practices Follow official documentation Join community forums Contribute to open source Write about what you ...