Recent Articles

Understanding ACLs in Linux

Traditional file permissions (read, write, execute) may not always provide the fine-grained access control you need, especially in shared environments.

16 Nov 2024 Jamison Johnson Reading Time: 5 minute
Port Redirection on RHEL Servers

Port redirection is a powerful tool for managing network traffic.

9 Nov 2024 Jamison Johnson Reading Time: 5 minute
Creating Custom Commands with Scripts in `/usr/local/bin`

The ability to create custom commands allows you to streamline your workflow by automating repetitive tasks or creating shortcuts for complex commands.

2 Nov 2024 Jamison Johnson Reading Time: 3 minute
Securing SSH Access - Disabling Password Authentication vs. Locking User Accounts

When it comes to securing SSH access on a Linux system, two effective methods are disabling password authentication and locking user accounts.

19 Oct 2024 Jamison Johnson Reading Time: 3 minute
Mastering the `screen` Command in Linux

The `screen` command in Linux is a terminal multiplexer that allows you to manage multiple terminal sessions from a single window.

12 Oct 2024 Jamison Johnson Reading Time: 4 minute
Exploring the Linux Locate Command

The `locate` command in Linux is a fast and efficient utility used to find the location of files and directories on the system.

5 Oct 2024 Jamison Johnson Reading Time: 4 minute
Understanding Linux Last Command

The `last` command in Linux is a simple yet powerful tool used to display the login history of users on a system.

28 Sep 2024 Jamison Johnson Reading Time: 3 minute
Understanding Network Information Service (NIS) and Its Future in Red Hat

Network Information Service (NIS), originally known as Yellow Pages (YP), is a client-server directory service protocol for distributing system configuration data such as user and host names between computers on a network.

21 Sep 2024 Jamison Johnson Reading Time: 4 minute
How to Install VirtualBox on macOS

VirtualBox is a widely-used, cross-platform virtualization software that allows you to create and manage virtual machines (VMs) on your Mac.

14 Sep 2024 Jamison Johnson Reading Time: 3 minute
Hyper-V is Not Dead - Understanding the Future of Microsoft's Hypervisor

Hyper-V remains a key player in the business and enterprise virtualization market.

7 Sep 2024 Jamison Johnson Reading Time: 4 minute
Understanding iCloud Private Relay

Apple has introduced iCloud Private Relay, a feature designed to protect user privacy and enhance security while browsing the internet.

31 Aug 2024 Jamison Johnson Reading Time: 4 minute
Configuring Microsoft Remote Desktop Outside of the App Store

Microsoft has made its Remote Desktop application available as a standalone installer, independent of the App Store.

24 Aug 2024 Jamison Johnson Reading Time: 2 minute
Using Vi to Replace Multiple Words in a Linux File

Using Vi to replace words in a file is a quick and powerful way to edit text in Linux.

17 Aug 2024 Jamison Johnson Reading Time: 3 minute
Understanding the Difference Between Switch User Commands

When managing a Linux system, especially as an administrator, you often need to switch user accounts to perform tasks with different permissions.

10 Aug 2024 Jamison Johnson Reading Time: 4 minute
Changing the Default Location of the AuthorizedKeysFile

Changing the default location of the AuthorizedKeysFile can significantly enhance the security of your SSH setup by making it more difficult for attackers to locate and manipulate the file.

3 Aug 2024 Jamison Johnson Reading Time: 3 minute
Monitoring User Logins on a RHEL Server

Keeping track of user login activities on your Red Hat Enterprise Linux (RHEL) server is essential for maintaining security and accountability.

27 Jul 2024 Jamison Johnson Reading Time: 3 minute
Configuring Sudo Access - Wheel Group vs. /etc/sudoers.d/USERNAME File

Proper configuration of `sudo` access is crucial for system security and administration.

20 Jul 2024 Jamison Johnson Reading Time: 5 minute
Understanding the Difference Between LAMP and LEMP Web Stacks - Which is Preferred?

When it comes to building and deploying web applications, choosing the right stack is crucial for performance, scalability, and ease of development.

13 Jul 2024 Jamison Johnson Reading Time: 5 minute
The DevOps Toolkit - A Comprehensive Guide

DevOps has revolutionized the way software development and operations teams work together, creating a more streamlined and efficient process for delivering software.

6 Jul 2024 Jamison Johnson Reading Time: 5 minute

© 2020 - 2024 Jamison Johnson
Disclaimer | Privacy Information | Search Blog Mastodon - @cristiancastellari@mastodon.uno @cristian@livellosegreto.it