Linux

tldr — A Practical Alternative to man Pages

A concise review and reference for tldr, a community-driven alternative to traditional man pages that focuses on practical command examples.

7 Feb 2026 Jamison Johnson Reading Time: 3 minute
How to Upload ISO Files to Proxmox Servers

Learn reliable methods to upload ISO files to Proxmox VE servers when the web GUI upload gets stuck, using SCP or WinSCP.

7 Feb 2026 Jamison Johnson Reading Time: 3 minute
Splunk Forwarder Installation Failure — Root Cause Summary

Summary of a Splunk Universal Forwarder installation failure, including symptoms, root cause, and resolution.

13 Dec 2025 Jamison Johnson Reading Time: 3 minute
Confirming the OS Configuration Date in RHEL

Learn how to determine when a RHEL 10 system was initially installed or configured using audit-friendly forensic indicators.

29 Nov 2025 Jamison Johnson Reading Time: 2 minute
Zero-Typing SSH on macOS — Connect Using Only Hostnames

Learn how to configure macOS so typing just a hostname automatically opens an SSH session with proper agent forwarding and security controls.

25 Oct 2025 Jamison Johnson Reading Time: 3 minute
Don't Use 'git pull' — And What To Do Instead

Learn why 'git pull' can clutter your commit history and how using 'git pull --rebase' keeps your repository clean and maintainable.

18 Oct 2025 Jamison Johnson Reading Time: 4 minute
Why I Trust Files — Not Directories — in fapolicyd Rules for Splunk

When working with security-focused systems, especially those protected by fapolicyd, it's essential to understand the implications of how trust is assigned to executable files.

2 Aug 2025 Jamison Johnson Reading Time: 4 minute
Edubuntu 24.04 LTS Review

Edubuntu has returned with the 24.04 LTS release, offering a modern, stable, and purpose-built Linux distribution tailored specifically for educational environments.

19 Jul 2025 Jamison Johnson Reading Time: 3 minute
Integrating OnlyOffice with Nextcloud

Nextcloud is a powerful self-hosted collaboration suite—but by default, it lacks the ability to edit Office documents like Word, Excel, or PowerPoint directly in the browser.

12 Jul 2025 Jamison Johnson Reading Time: 2 minute
TP-Link USB Wi-Fi Adapter Configuration on Ubuntu 24.04 LTS

Getting a TP-Link USB Wi-Fi adapter working on Ubuntu 24.04 LTS isn't always as plug-and-play as you’d hope.

21 Jun 2025 Jamison Johnson Reading Time: 2 minute
Using `mktemp` to Safely Create Temporary Files and Directories

mktemp safely creates unique and secure temoprary files and directories.

7 Jun 2025 Jamison Johnson Reading Time: 3 minute
Configuring Logging with Rsyslog

Centralized logging using Rsyslog is one of the most efficient ways to achieve logging.

24 May 2025 Jamison Johnson Reading Time: 5 minute
Understanding the .bashrc File in Linux

One of the most important files for tailoring your environment is the `.bashrc` file.

17 May 2025 Jamison Johnson Reading Time: 3 minute
Show Git Branch in Your Terminal Prompt Automatically

Thankfully, there’s a way to enhance your command line interface so you always know which Git branch you’re on—without running `git status` every few minutes.

10 May 2025 Jamison Johnson Reading Time: 3 minute
Review/Understanding of the namei Command

To effectively diagnose and resolve these issues, a tool that can illuminate the path resolution process is indispensable. That tool is `namei`.

3 May 2025 Jamison Johnson Reading Time: 4 minute
Understanding Snap Packages

Snap has its share of drawbacks, leading to an ongoing debate about whether it truly improves the Linux ecosystem or introduces unnecessary complexity.

12 Apr 2025 Jamison Johnson Reading Time: 5 minute
Understanding Splunk Forwarder Connection to Splunk Server

Splunk is a powerful platform for collecting, indexing, and analyzing log data. A crucial component of Splunk’s architecture is the Splunk Universal Forwarder (UF).

5 Apr 2025 Jamison Johnson Reading Time: 3 minute
How ACL Masks Let You Fine-Tune File Permissions in Linux

Let's dive into this important concept by taking a look at what they are and how they interact with Linux file system permissions.

15 Mar 2025 Jamison Johnson Reading Time: 4 minute
Exploring the ausearch Command in Linux

The `ausearch` command is a powerful tool for querying and analyzing audit logs in Linux systems.

15 Feb 2025 Jamison Johnson Reading Time: 5 minute
Understanding the Difference Between `apt` and `apt-get`

Both `apt` and `apt-get` are powerful tools for managing software packages on Debian-based systems.

25 Jan 2025 Jamison Johnson Reading Time: 4 minute
Understanding the `virsh` Command in Virtualization Management

The `virsh` command is a powerful utility for managing virtual machines (VMs) in Linux-based environments.

18 Jan 2025 Jamison Johnson Reading Time: 5 minute
Understanding the Purpose of the Cygwin Cache

Cygwin is a powerful tool that provides a Unix-like environment and command-line interface for Windows, bridging compatibility between Linux applications and Windows OS.

11 Jan 2025 Jamison Johnson Reading Time: 6 minute
How to Generate Random Secure Passwords with OpenSSL

When it comes to security, one of the most critical tasks is generating strong, unpredictable passwords.

21 Dec 2024 Jamison Johnson Reading Time: 5 minute
Streamlining Remote Script Execution with SSH and Bash

SSH and bash together can create some powerful tools. We will streamline a great process in this blog post.

7 Dec 2024 Jamison Johnson Reading Time: 5 minute
Understanding ACLs in Linux

Traditional file permissions (read, write, execute) may not always provide the fine-grained access control you need, especially in shared environments.

16 Nov 2024 Jamison Johnson Reading Time: 5 minute
Port Redirection on RHEL Servers

Port redirection is a powerful tool for managing network traffic.

9 Nov 2024 Jamison Johnson Reading Time: 5 minute
Creating Custom Commands with Scripts in `/usr/local/bin`

The ability to create custom commands allows you to streamline your workflow by automating repetitive tasks or creating shortcuts for complex commands.

2 Nov 2024 Jamison Johnson Reading Time: 3 minute
Securing SSH Access - Disabling Password Authentication vs. Locking User Accounts

When it comes to securing SSH access on a Linux system, two effective methods are disabling password authentication and locking user accounts.

19 Oct 2024 Jamison Johnson Reading Time: 3 minute
Mastering the `screen` Command in Linux

The `screen` command in Linux is a terminal multiplexer that allows you to manage multiple terminal sessions from a single window.

12 Oct 2024 Jamison Johnson Reading Time: 4 minute
Exploring the Linux Locate Command

The `locate` command in Linux is a fast and efficient utility used to find the location of files and directories on the system.

5 Oct 2024 Jamison Johnson Reading Time: 4 minute
Understanding Linux Last Command

The `last` command in Linux is a simple yet powerful tool used to display the login history of users on a system.

28 Sep 2024 Jamison Johnson Reading Time: 3 minute
Understanding Network Information Service (NIS) and Its Future in Red Hat

Network Information Service (NIS), originally known as Yellow Pages (YP), is a client-server directory service protocol for distributing system configuration data such as user and host names between computers on a network.

21 Sep 2024 Jamison Johnson Reading Time: 4 minute
Using Vi to Replace Multiple Words in a Linux File

Using Vi to replace words in a file is a quick and powerful way to edit text in Linux.

17 Aug 2024 Jamison Johnson Reading Time: 3 minute
Understanding the Difference Between Switch User Commands

When managing a Linux system, especially as an administrator, you often need to switch user accounts to perform tasks with different permissions.

10 Aug 2024 Jamison Johnson Reading Time: 4 minute
Changing the Default Location of the AuthorizedKeysFile

Changing the default location of the AuthorizedKeysFile can significantly enhance the security of your SSH setup by making it more difficult for attackers to locate and manipulate the file.

3 Aug 2024 Jamison Johnson Reading Time: 3 minute
Monitoring User Logins on a RHEL Server

Keeping track of user login activities on your Red Hat Enterprise Linux (RHEL) server is essential for maintaining security and accountability.

27 Jul 2024 Jamison Johnson Reading Time: 3 minute
Configuring Sudo Access - Wheel Group vs. /etc/sudoers.d/USERNAME File

Proper configuration of `sudo` access is crucial for system security and administration.

20 Jul 2024 Jamison Johnson Reading Time: 5 minute
Understanding tmux - Your Ultimate Productivity Companion

If you're spending a lot of time in the terminal and haven't yet explored the wonders of tmux, you're missing out. If you're not already using Team UX (tmux), it's time to start.

29 Jun 2024 Jamison Johnson Reading Time: 5 minute
Enhancing SSH Security with Two-Factor Authentication on RHEL

We'll walk you through the process of setting up two-factor authentication using Google Authenticator and Pluggable Authentication Modules (PAM) in SSH on RHEL.

15 Jun 2024 Jamison Johnson Reading Time: 4 minute
Exploring the Watch Command

The watch command can be incredibly useful for monitoring system activity, tracking changes, and observing command output over time.

23 May 2024 Jamison Johnson Reading Time: 2 minute
Generating a SOS Report for RedHat Support

We'll walk you through the steps to generate an SOS report for RedHat Support.

20 May 2024 Jamison Johnson Reading Time: 2 minute
Sending Email from Terminal in RHEL 9

We will show you a step-by-step guide to configure and use Postfix for sending emails from your RHEL 9 terminal.

14 May 2024 Jamison Johnson Reading Time: 3 minute
Understanding the tr Command

The tr command in Linux is a powerful tool used for translating or deleting characters.

30 Mar 2024 Jamison Johnson Reading Time: 2 minute
Selecting the Preferred NTP Server for Time Synchronization

We will explore the process of selecting a preferred NTP server for time synchronization.

24 Mar 2024 Jamison Johnson Reading Time: 2 minute
Configuring a NTP Server and Synchronizing Time with a Client

we will walk through the process of configuring a Network Time Protocol (NTP) server on a RHEL 9 system.

21 Mar 2024 Jamison Johnson Reading Time: 3 minute
Understanding Secure Connections with sshuttle

We will explore the key aspects of `sshuttle` and how it can be a valuable addition to your networking toolkit.

18 Mar 2024 Jamison Johnson Reading Time: 3 minute
Configuring Splunk Forwarder on RHEL 9

This blog post provides a step-by-step guide on configuring a Splunk forwarder on a RHEL 9 host, enabling you to forward log data to a centralized Splunk instance for analysis.

12 Mar 2024 Jamison Johnson Reading Time: 3 minute
Understanding Tape Operations with the `mt` Command

This blog post explores the capabilities of the `mt` command, shedding light on its usage and significance in managing tape operations.

9 Mar 2024 Jamison Johnson Reading Time: 3 minute
Purposes of a Wrapper Script in RHEL

Wrapper scripts play a crucial role in enhancing the efficiency and manageability of various processes and commands.

6 Mar 2024 Jamison Johnson Reading Time: 2 minute
Backporting in RHEL - Enhancing Stability and Security

is blog post explores the concept of backporting in RHEL, its significance, and how it enhances both stability and security.

26 Feb 2024 Jamison Johnson Reading Time: 3 minute
Nohup Command With SSH Sessions

This blog post delves into the significance of `nohup` and why it's crucial for uninterrupted task execution.

23 Feb 2024 Jamison Johnson Reading Time: 3 minute
AIDE File Integrity Safeguarding Your Linux System

This blog post will guide you through the installation, configuration, and utilization of AIDE on a Linux system.

20 Feb 2024 Jamison Johnson Reading Time: 2 minute
Unraveling the "Signature not supported. Hash algorithm SHA1 not available" Error

This blog post aims to shed light on the causes behind this error and provides a detailed guide on how to resolve it.

14 Feb 2024 Jamison Johnson Reading Time: 2 minute
Using pip3 Package Manager

In this blog post, we'll walk through the steps to install `python3-pip` and explore how to use the `pip3` package manager.

11 Feb 2024 Jamison Johnson Reading Time: 2 minute
Unveiling Cryptographic Hash Functions

We'll touch upon the evolving landscape of cryptographic hashing and what the future holds.

8 Feb 2024 Jamison Johnson Reading Time: 3 minute
Understanding the Dollar Sign ($) in Bash Scripts

In Bash scripting, the dollar sign `($)` holds special significance as it is used to reference the value of a variable.

5 Feb 2024 Jamison Johnson Reading Time: 2 minute
Creating a Custom Alias

In this guide, we'll walk through the steps of creating an alias for a command of your choice in your Bash configuration.

2 Feb 2024 Jamison Johnson Reading Time: 2 minute
Enabling SSH While FIPS Mode is Enabled on RHEL

In the realm of secure communication between systems, generating SSH keys plays a pivotal role. The `ssh-keygen` command allows users to create cryptographic keys used for authenticating and securing connections.

24 Jan 2024 Jamison Johnson Reading Time: 3 minute
Exploring IDENT Authentication Method

In this blog post, we delve into the intricate world of IDENT authentication, uncovering its role in networking and system authentication protocols.

21 Jan 2024 Jamison Johnson Reading Time: 3 minute
Emacs vs. Vi (Vim) Text Editors

Let's delve into the timeless debate between these two iconic text editors.

18 Jan 2024 Jamison Johnson Reading Time: 3 minute
Exploring Red Hat Insights

In this blog post, we'll delve into the features, benefits, and the impact of Red Hat Insights in modern IT landscapes.

15 Jan 2024 Jamison Johnson Reading Time: 4 minute
Understanding SELinux

In today's cyber landscape, robust security measures are non-negotiable. Security-Enhanced Linux (SELinux) emerges as a pivotal framework fortifying systems against vulnerabilities.

12 Jan 2024 Jamison Johnson Reading Time: 3 minute
Enabling Line Numbers in Vim

Vim, a powerful text editor, offers various customization options to suit users' preferences. Enabling line numbers can significantly aid navigation and reference while editing files.

9 Jan 2024 Jamison Johnson Reading Time: 1 minute
Splunk Configuration Details

Splunk is a powerful tool for analyzing, monitoring, and visualizing machine-generated data. Setting up Splunk involves a few steps to harness its capabilities fully.

3 Jan 2024 Jamison Johnson Reading Time: 2 minute
Monitoring the aide.log File

This blog post delves into the importance of regularly monitoring the `aide.log` file, highlighting its role in identifying system changes, providing early detection of security threats, and ensuring compliance and audit trails.

31 Dec 2023 Jamison Johnson Reading Time: 4 minute
Understanding Compression GZIP vs. LZO for Bacula Backups

When it comes to choosing between LZO and GZIP compression for Bacula backups, it's essential to weigh the trade-offs between speed, compression efficiency, and resource utilization.

25 Dec 2023 Jamison Johnson Reading Time: 2 minute
Understanding firewall-cmd Rich Rules

Let's delve into mastering `firewall-cmd` rich rules to fortify your system's defenses.

22 Dec 2023 Jamison Johnson Reading Time: 3 minute
Configuring SSH Agent Forwarding for Secure Remote Access

Let's delve into SSH Agents, what Agent Forwarding is, and how to configure it for secure remote access.

19 Dec 2023 Jamison Johnson Reading Time: 4 minute
Obtaining a Red Hat Developer Subscription and Activating RHEL9

This guide walks you through the process of acquiring the subscription, downloading the official RHEL9 ISO, registering your machine, and activating it for updates.

13 Dec 2023 Jamison Johnson Reading Time: 2 minute
Enhancing Security with faillock and fail2ban

In this guide, we'll delve into the functionalities of these commands, their configurations, and when to use each for optimal security.

10 Dec 2023 Jamison Johnson Reading Time: 8 minute
Connect to a Remote Windows System from Linux Terminal using xfreerdp

In this tutorial, we will show you how to use the xfreerdp package to establish a remote desktop connection to a Windows machine from your Linux terminal.

28 Nov 2023 Jamison Johnson Reading Time: 2 minute

© 2020 - 2026 Jamison Johnson
Disclaimer | Privacy Information Mastodon - @cristiancastellari@mastodon.uno @cristian@livellosegreto.it