Linux

How To Debug a Bash Shell Script Under Linux or UNIX

https://www.cyberciti.biz/tips/debugging-shell-script.html Shell scripting debugging can be a tedious job (read as not easy). There are various ways to debug a shell script. Read this article see how to debug a bash script running on Linux and Unix using various methods.

OpenSSH Server Best Security Practices

https://www.cyberciti.biz/tips/linux-unix-bsd-openssh-server-best-practices.html This page shows how to secure your OpenSSH server running on a Linux or Unix-like system to improve sshd security. Read also how to only allow ssh login using SSH keys https://www.cyberciti.biz/faq/how-to-disable-ssh-password-login-on-linux/

Escape Docker Container Using waitid() | CVE-2017-5123 | Twistlock

https://www.twistlock.com/2017/12/27/escaping-docker-container-using-waitid-cve-2017-5123/ In 2017 alone, 434 linux kernel exploits where found, and as you have seen in this post, kernel exploits can be devastating for containerized environments. This is because containers share the same kernel as the host, thus trusting the built-in protection mechanisms alone isn’t sufficient. Make sure your kernel is always updated on all

Monitor Linux with Grafana | Opensource.com

https://opensource.com/article/17/8/linux-grafana?sc_cid=70160000001273HAAQ  This is a basic walkthrough for how to set things up to monitor Linux system and networking. This is a basic install that incorporates collectd, InfluxDB, and Grafana on the same host.

Best of Opensource.com: Sysadmin

https://opensource.com/article/17/12/top-5-sysadmin-articles-2017?sc_cid=7016000000127ECAAY   Take a look at Opensource.com’s top 5 articles for system administrators from the past year.

Linux antivirus and anti malware: 8 top tools | CSO Online

https://www.csoonline.com/article/3238884/linux/linux-antivirus-and-anti-malware-8-top-tools.html  By most estimates, more than 50 percent of web servers on the internet are running some version of Linux or a related *nix. That should be enough to drive home how critical it is to the ongoing success of the Information Age that you analyze, identify, and eradicate malware on or passing through your