- Details
-
Category: Creating and using FOSS
-
Published on Friday, 05 June 2015 23:50
-
Written by Super User
-
Hits: 29678
So you want to be a Linux sysadmin?
software/application management (installing, testing, and updating the software on systems)
Are Linux GUI Software Centers Any Good? Let’s Find Out!
A Comparison of Three Linux 'App Stores'
Flathub vs. Snap Store: Which App Store Should You Use?
How To Search If A Package Is Available On Your Linux Distribution Or Not
How To Find The List Of Installed Repositories From Commandline In Linux
How To List Installed Packages From A Certain Repository In Linux
How To Install Packages From A Specific Repository In Linux
How Do We Find Out The Installed Packages Came From Which Repository?
How to Fix Unmet dependencies Error During Package Installation or Upgrade
Package manager
sysget – A Front-end for Every Package Manager in Linux
Is implementing and managing Linux applications becoming a snap?
How to Install Software on Linux
How to Fix Broken Packages in Linux
How to install a device driver on Linux
How to Use Homebrew to Install Software on Linux and Windows
What Is a PPA in Ubuntu, and How Do You Use It?
How to Convert From RPM to DEB and DEB to RPM Package Using Alien
Debian Package Manager: Everything You Need to Know
Best Universal Package Manager for Linux? - Datamation
Linux Package Managers Compared – AppImage vs Snap vs Flatpak
What Are Linux Meta-packages? - Freedom Penguin
Manage AppImages, AUR, Flatpaks And Snaps With Bauh
Synaptic/apt-get |
Synaptic Package Manager Beginners Guide For Ubuntu Users | Ubuntu Geek |
SynapticHowto - Community Ubuntu Documentation |
How to install and use the Synaptic Package Manager - YouTube |
Linux for Beginners: Apt-Get Package Manager - YouTube |
APT (Advanced Package Manager) - Installing Software On Debian Linux Systems - YouTube |
Package Management with DPKG and APT - YouTube |
Ubuntu apt-get & apt-cache commands with practical examples |
Simplify Command-Line Package Management with APT instead of apt-get |
The Beginner’s Guide to the dpkg Command in Debian-Based Linux Distro |
Rollback an apt-get upgrade if something goes wrong on Debian / Ubuntu Linux |
25 Useful Basic Commands of APT-GET and APT-CACHE for Package Management |
What is APT and Aptitude? and What's real Difference Between Them? |
Apt Package Management Tool |
APT Package Manager on Linux Explained |
Using the Lightweight Apt Package Manager Synaptic in Ubuntu and Other Debian-based Linux Distributions |
apt vs apt-get - Advanced Package Tool |
The Ultimate Guide to Apt and Apt-Get Commands |
What is the Difference Between ‘apt remove’ and ‘apt purge’? |
Mist: An AUR-Helper-Like Application for Debian and Ubuntu |
apt-offline – Fully Upgrade Offline Debian-based Distributions |
When to Use apt clean, apt autoclean, and apt autoremove |
Nala: A Prettier Frontend for the APT Command |
Apt++? Nala is Like Apt in Ubuntu but Better |
|
YUM/RPM/DNF |
Linux for Beginners: YUM Package Manager - YouTube |
Using Linux YUM Package Manager - YouTube |
Linux YUM Tutorial - LinuxMoz |
Managing Software with yum |
How to use yum - Introduction |
yum Fedora Linux Howto |
15 Linux Yum Command Examples - Install, Uninstall, Update Packages |
Learn how to Manage Software with YUM in Linux System Administration from GogoTraining.com - YouTube |
Yum Extender - A Graphical frontend tool for YUM/DNF - OSTechNix |
YUM automatic updates! Save your valuable time! |
20 Linux YUM (Yellowdog Updater, Modified) Commands for Package Management |
Package Management with RPM and YUM - YouTube |
What is the Difference Between DNF and YUM Commands? |
|
|
|
|
|
All you have to know about RPM |
rpm command |
Some pretty useful YUM tips & tricks |
How to use the Linux RPM command | CentOS | Linux Tutorial |
Learning Linux: Lesson 13 RPM software management - YouTube |
20 Practical Examples of RPM Commands in Linux |
Difference Between YUM and RPM |
The Difference Between DNF and YUM, Why is Yum Replaced by DNF? |
RPM and GPG: How to verify Linux packages before installing them |
How To Enable RPM Fusion Repository In Fedora, RHEL, AlmaLinux, Rocky Linux |
|
|
|
|
|
DNF, the next-generation replacement for Yum — DNF 2.0.0-1 documentation |
What Is DNF Package Manager And How To Use It |
Mastering DNF command with examples |
How to work with dnf package groups |
DNF Guide for Beginners with 20 Examples |
DNF Command Line Package Manager in Linux: A Complete Guide |
Zypper |
OpenSUSE Administation with Zypper |
Using Zypper |
Zypper cheat sheet (pdf) |
45 Zypper Commands to Manage ‘Suse’ Linux Package Management |
Package Management With Zypper |
Zypper Command Examples: A Beginner’s Guide to the SUSE Linux Package Manager |
Installing from source |
How To Compile A Linux Program From Source - YouTube |
How To Compile a Program From Source Code in Linux - YouTube |
Installing from source on Linux part 1. - YouTube |
tar Man Page | SS64.com |
HowTo install software from Source Code | Linux Blog |
How To: Install Programs from Source Code, (Linux) - Yahoo Voices - voices.yahoo.com |
Basics Of Compiling Software From Source Code In Linux |
What is a Makefile and how does it work? |
An Easy Way To Remove Programs Installed From Source In Linux |
How To Build Debian Packages From Source |
How to Use make and makefile in Linux |
|
account management(adding and removing accounts, managing user access and privileges)
server management (running backups, monitoring and tuning performance, rebooting,
setting up cron jobs, looking after the hardware and reviewing log files)
security management (managing host-based firewalls, checking file permissions, and checking
on important security configurations)
Linux Security - Top News | Advisories | HowTo's | Feature Release | Cybersecurityguide.org - About us |
Building Internet Firewalls, 2nd Edition |
|
Linux Firewall Configuration and Setup - iptables |
Linux: 20 Iptables Examples For New SysAdmins |
netfilter/iptables project homepage - The netfilter.org "nftables" project |
Why you will love nftables » To Linux and beyond ! |
nftables - Wikipedia |
Nftables - Gentoo Wiki |
nftables HOWTO |
nftables - ArchWiki |
iptables vs nftables: What’s the Difference? |
Linux Firewalls: Enhancing Security with nftables and Beyond (4th Edition): Steve Suehring Books - Amazon.ca |
Linux Firewalls: Enhancing Security with Nftables and Beyond : Steve Suehring |
Common Firewall Rules and Commands in iptables |
The Beginner’s Guide to IPTables (Linux Firewall) Commands |
systemd application firewalls by example |
|
|
|
|
|
A beginner's guide to firewalld in Linux |
Introduction to Firewalld Basics |
How to Restrict Network Access Using FirewallD |
Introduction to Linux firewalld zones and rules |
Give your Linux system's firewall a security boost |
A hole in one: Firewall exception testing and troubleshooting |
Secure your Linux network with firewall-cmd |
Useful 'FirewallD' Rules to Configure and Manage Firewall in Linux |
An introduction to firewalld rules and scenarios |
Shorewall – A High-Level Firewall for Configuring Linux Servers |
|
|
|
|
|
IPFire: A User-Friendly Linux Firewall Distribution |
16 iptables tips and tricks for sysadmins |
6 Best Open Source Firewall Solutions - Linux Links - The Linux Portal Site |
Linux Security Audit and Hacker Software Tools |
26 Security Hardening Tips for Modern Linux Servers |
The Linux Works: List of Linux System Hardening Resources |
Linux System Administration and Configuration - SELinux |
100 Open Source Replacements for Popular Security Tools - Datamation |
Server Hardening | Linux Journal |
An Introduction to SELinux | Linux.com |
How to secure your Linux environment with Nitrokey USB smart card - Xmodulo |
Three tools to scan a Linux server for Malware and Rootkits |
Linux and Unix Port Scanning With netcat [nc] Command |
10 Best Open-Source Vulnerability Scanners for 2023 |
8 Best Free and Open Source Vulnerability Detection Tools |
Securing & Optimizing Linux Servers |
10 Useful Open Source Security Firewalls for Linux Systems |
Home | OpenSCAP portal |
SCAP: Computer Security for the Rest of Us |
10 Open Source Security Breach Prevention and Detection Tools - eSecurity Planet |
NVD - Home |
Top 5 Penetration Testing Linux Distributions - LinuxAndUbuntu |
BackBox Linux for Penetration Testing |
22 essential security commands for Linux |
10 Linux distributions recommended for 2018 |
Linux Internet Server Security and Configuration Tutorial |
Practical UNIX & Internet Security |
5 Tools to Scan a Linux Server for Malware and Rootkits |
Linux Tutorial - Managing Group Access on Linux and UNIX |
Three Critical Resources You Should Use to Harden Your Linux Server |
Using Nmap results to help harden Linux systems |
Secure Your Linux Server With Fail2Ban [Beginner’s Guide] |
40 Linux Server Hardening Security Tips [2019 edition] |
Nmap Vulnerability Scanning Made Easy: Tutorial |
Watchman – A File and Directory Watching Tool for Changes |
fswatch – Monitors Files and Directory Changes or Modifications in Linux |
The aftermath of the Gentoo GitHub hack |
The IT Security Mistakes that Led to the Equifax Breach |
How to Securely Erase a Disk and File using the Linux shred Command |
3 quick ways to reduce your attack surface on Linux |
How Linux Stores and Manages User Passwords |
The importance of secure passwords can’t be emphasized enough |
Top passwords used in RDP brute-force attacks |
The top 200 most common passwords in 2022 are bad, mkay? |
|
TCP/IP Network Administration - Network Security |
How To Restrict Access To Linux Servers Using TCP Wrappers |
|
Recovering a breached Linux system |
3 antimalware solutions for Linux systems |
Using systemd features to secure services |
Using SSH Port Forwarding as a Security Tool in Linux |
Block SSH Server Attacks (Brute Force Attacks) Using DenyHosts |
OpenSSH Security Hardening Guide for Linux |
How to Set Up SSH to Use Two-Factor Authentication |
|
|
How to Handle Account Passwords in Linux With passwd Command |
Anatomy of a Linux Ransomware Attack |
Debsecan : You will not miss another security update |
How To Encrypt File on Linux |
7 Tools to Encrypt/Decrypt and Password Protect Files in Linux |
6 OpenSSL command options that every sysadmin should know |
How to encrypt block devices using LUKS on Linux |
Cryptmount – A Utility to Create Encrypted Filesystems in Linux |
Secure Your Data: How to Encrypt a Partition or Disk on Linux |
Linux security: Intrusion detection and prevention |
|
|
Introducing gpg-tui, a Terminal User Interface for GnuPG |
LFCA: How to Improve Linux System Security – Part 20 |
Posts by Prashant Phatak |
How to Protect Against DDoS Attacks |
Home | The No More Ransom Project |
What Is Log4Shell and How to Protect Your Linux System Against It |
5 Best OpenSSH Server Best Security Practices |
How to Create an SSH Honeypot to Catch Hackers in Your Linux Server |
How cybercriminals are using malware to target Linux-based operating systems |
Install, Configure, and Scan for Viruses on Linux with ClamAV |
5 open-source vulnerability assessment tools to try out |
7 open-source malware analysis tools you should try out |
Top PHP Hardening Security Tips for Linux Servers |
A Complete Guide to Security Automation & Reporting Using Open Source Tools |
What Threats Do Linux Users Face? |
3 Best Ways to Securely Wipe Disk in Linux Using Command Line |
Can Linux Get Viruses? Exploring the Vulnerability of Linux Systems |
Supercharging Linux: Tips & Tricks to Beat the Threat Landscape |
|
The annual “Open Source Security and Risk Analysis” (OSSRA) report |
|
Kali Linux | Become an ethical hacker with this free 15-hour penetration testing course | Best Open-Source Distributions for Pentesting and Forensics |
What Is Kali Linux, and Do You Need It? |
Kali Linux: What You Must Know Before Using it |
Kali inside VirtualBox (Guest VM) |
Kali Linux Improves Penetration Testing |
Top 10 best tutorials to start learning hacking with Kali Linux |
Kali inside VMware (Guest VM) |
Kali Linux Hacking tutorials : Perfect guide to Beginners {2019} |
Top Tutorials To Learn Kali Linux For Beginners |
Installing Kali Linux on VirtualBox: Quickest & Safest Way |
Kali Linux Courses |
Kali Linux Tutorial | tutorialspoint |
Kali Linux Tutorial For Beginners |
Learn about computer security with the Raspberry Pi and Kali Linux |
Kali Linux Cheat Sheet for Penetration Testers |
Kali Linux Tutorial |
How to Build a Hacking Station with Raspberry Pi and Kali Linux |
Kali Linux on VirtualBox: A Step-by-Step Installation Guide |
Connecting a Wireless Adapter to a Kali Linux Virtual Machine |
Linux Security Auditing with Lynis |
Advance your penetration testing skills by mastering Kali Linux |
5 Kali Linux tools you should learn how to use |
5 Kali Linux books you should read this year |
Introduction to Kali Linux: Everything You Need to Know |
Why is Kali Linux Preferred by Hackers? |
How to Install Metasploit Framework in Kali Linux |
How to Install Kali Linux on a USB Drive |
|
|
|
|
BlackArch |
BlackArch |
|
BlackArch Linux: Ethical Hacking & Penetration Testing | Udemy |
BlackArch Linux: Ethical Hacking & Penetration Testing Download Free |
BlackArch Linux 2020.01: new year to learn hacking |
BlackArch ISO Download [ LATEST ISO ] |
How to Install Arch Linux |
BlackArch and How to Install It on Your USB Flash Drive |
Here's a List of All the Ethical Hacking Tools Included in BlackArch Linux |
|
|
|
|
|
10 Top Open Source Penetration Testing Tools |
Top 10 Open Source Vulnerability Assessment Tools |
What are White Hat, Black Hat, and Red Hat Hackers? Different Types of Hacking Explained |
5 free resources from the Cybersecurity and Infrastructure Security Agency (CISA) |
Authentication vs Authorization – What's the Difference? |
Improve Your Cybersecurity Command Line Skills – Bandit OverTheWire Game Walkthrough |
2FA, 3FA, MFA… What does it all mean? |
Exodia OS: Emerging BSPWM-based Arch Linux for Pentesters |
5 cybersecurity trends accelerating in 2023 |
John the Ripper: Password Cracking Tutorial and Review |
Savvy cybersecurity pros benefit from host of free resources to step up fight against hackers and cyber threats |
Cyber Security Resources | SANS Institute |
10 Best Linux Distributions for Hacking & Pen Testing [2023] |
Crooks don't need ChatGPT to social-engineer victims, as they're more than happy to demonstrate |
Scholarship and Community Programs | Cyber Security - SANS Institute |
Training in Spanish for cyber security pros |
10 open-source recon tools worth your time |
15 Best Online Udemy Penetration Testing Courses |
12 open-source penetration testing tools you might not know about |
Velociraptor: Open-source digital forensics and incident response |
11 search engines for cybersecurity research you can use right now |
Linux Endpoint Detection and Response (EDR): A Crucial Part of a Successful Cybersecurity Strategy |
10 essential cybersecurity cheat sheets available for free |
Social engineer reveals effective tricks for real-world intrusions |
What a glimpse inside the Black Hat NOC reveals about infosec pros' security habits |
|
|
how and when to use ^c, ^d, and ^z.
how to use pipes and redirects. If >, >>, 2>, and 2>&1 aren’t second nature to you, you need to
make them so.
how to use /dev/null both to make output disappear and to empty files.
how to use of $? (the return code or "exit code") to determine if the previous command
(usually within a script) completed successfully.
how to use regular expressions with commands such as ls, grep and perl.
the effect of various quotes - how single and double quotes differ and how ` (backticks)
can be used to add command output to a line.
how to add and remove accounts (with or without removing the associated directories).
how to work with permissions, timestamps, owners, and groups -- and how to determine if
additional permissions have been assigned with the setfacl command. You should also get
to know how to work with the security context of files when SELinux is in use.
how to use essential Unix utilities like grep, awk, sed, and wc.
how to use text editors. In fact, you really should know vi, though if it takes some time
to get used to. Even if you love desktop editors like Gedit, you will someday find yourself
on a command line with no other option. Besides, vi (along with its colorful variation, vim)
can make a lot of the work that you do go a lot faster once you know how to use it well.
scripting basics. You need to be very good at basic scripting - using if, for, and while
commands if not also case statements and functions.
how to work with processes - understanding ps output, knowing the kind of information you
can get from /proc and how to use tools like lsof for determining what files a process has open.
how to set up a new file system, look at disk space, track down large files, use fsck, and
find files using many different criteria (size, ownership, permissions, type, etc.).
where to find key directories and configuration files - those in /etc (e.g., /etc/hosts,
the passwd and shadow files) and those in other locations (e.g., /etc/mail/sendmail.cf,
/etc/samba/smb.conf).
how to set up essential services (e.g., naming, printing).
how to install packages using yum and apt-get and also how to install software from tar.gz
files.
see software/application management (installing, testing, and updating the software on systems)
how to apply patches and how to know when they're needed.
how to monitor systems using commands such as df and du to look at disk space, and commands
like top and sar to monitor and evaluate performance.
how your systems boot - their dependence on "start scripts" and whether they use systemd or
upstart init services.
how to use basic commands like dump and tar to back up directories or entire file systems.
how to interact with other systems - logging in using ssh, moving files with scp and sftp,
and using rsync for synchronizing individual files or entire file systems.
ssh Man Page | Bash | SS64.com |
How to Use SSH: 16 Steps (with Pictures) - wikiHow |
Getting started with SSH - Kimmo Suominen |
ssh - OpenSSH SSH client (remote login program) | linux commands examples |
ssh - Linux Command - Unix Command |
ssh - secure shell client (remote login program) |
How To Use sshpass For Non-interactive SSH login In Scripts In Linux And FreeBSD |
Connect to SSH Server on Alternate Port |
|
Useful SSH Cheat Sheet for Linux System Administrators |
How to manage multiple SSH sessions from a single window with EasySSH |
WebSSH – Connect Linux Terminal from Your Web Browser |
SSH Is For Dummies Too! - Freedom Penguin |
EasySSH is your next favorite GUI SSH client |
Snowflake is the Linux SSH GUI you didn't know you needed |
Using the SSH Config File |
How to Customize SSH Settings For Maximum Security |
Autostart Tmux Session On Remote System When Logging In Via SSH |
How to Kill an Unresponsive SSH Connection in Linux |
Ásbrú Connection Manager – graphical frontend for SSH |
How to Set Up a Web-Based SSH: A Step-By-Step Guide |
|
|
|
scp Man Page | Bash | SS64.com |
10 SCP Commands to Transfer Files/Folders in Linux |
scp - secure copy (remote file copy program) | linux commands examples |
How to Copy Files Across a Network/Internet in UNIX/LINUX (Redhat, Debian, FreeBSD, etc) - scp tar rsync |
scp command line to securely copy files over ssh, between Linux, Mac or Windows |
Linux and UNIX sftp command help and examples |
How To Securely Transfer Files With SCP In Linux |
|
|
What is SFTP, and how do I use an SFTP client to transfer files? |
How To Use SFTP to Securely Transfer Files with a Remote Server | DigitalOcean |
sftp - secure file transfer program | linux commands examples |
SFTP Command, How to Use it Practically for Secure File Transfer |
How to Transfer Files Between Servers in Linux using SCP and FTP |
6 Best Command-Line FTP Clients for Linux Users |
|
|
|
Raspberry Pi based Pi-KVM goes to Kickstarter |
File Browser – A Cross-platform Stylish Web File Manager |
|
rsync Man Page | Bash | SS64.com |
Rsync: backup and restore |
rsync - a fast, versatile, remote (and local) file-copying tool | linux commands examples |
Easy Automated Snapshot-Style Backups with Rsync |
Do-It-Yourself Backup System Using Rsync |
The GNU Privacy Guard |
1 GPG: a Fedora primer |
2 GPG key management, part 1 |
3 GPG: Using Your Key |
Linux: Difference Between /dev/tty, /dev/tty0, and /dev/console |
|
|
Vim Tips – Edit Remote Files With Vim On Linux |
Vim Tips – Read And Write Remote Files With Vim On Linux |
Five best practices for administering remote systems |
Remmina – A Feature Rich Remote Desktop Sharing Tool for Linux |
How to Use Conspy to View and Control Remote Linux Virtual Consoles in Real Time |
ttyd – Share Your Linux Terminal Over Web Browser |
8 Most Popular SSH Clients for Linux |
10 Best PuTTY Alternatives for SSH Remote Connection |
How To Install And Use PuTTY On Linux |
How to use Apache Guacamole to create a VNC Connection |
How to Edit Files Over a Network Using FTP, SCP and HTTP |
5 Best Command Line HTTP Clients for Linux |
16 Best Tools to Access Remote Linux Desktop |
|
|
how to view and manipulate timestamps on files, including using the touch command.
see how to work with permissions, timestamps, owners, and groups
how to configure a network interface; how to use the ifconfig and ip addr commands; how to
set up the /etc/sysconfig/network file; when to use /etc/hosts and the hostname and domainname commands.
how to configure extended services like NFS, NIS, and Samba for sharing file systems and
network information with other Unix systems, and sharing files with Windows systems.
see how to set up essential services
how to do basic troubleshooting, tracking down what's wrong when something is broken, looking
at logs files, and using commands such as strace.
how to configure and use sudo for limiting the use of root access to the bare essentials.