DEV Community

Linux

What are clouds made of? Linux servers, mostly.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Using Fail2Ban to Protect Against Brute Force Attacks

Using Fail2Ban to Protect Against Brute Force Attacks

1
Comments
5 min read
🕰️Become a Timecop with Linux Task Scheduling: at, cron, and crontab

🕰️Become a Timecop with Linux Task Scheduling: at, cron, and crontab

2
Comments
4 min read
Efficient File Management in Linux

Efficient File Management in Linux

5
Comments
2 min read
National Space Day: May 2

National Space Day: May 2

Comments
1 min read
Understanding a Netcat-Based Reverse Shell Using FIFO

Understanding a Netcat-Based Reverse Shell Using FIFO

Comments
3 min read
Linux Fundamentals for DevOps

Linux Fundamentals for DevOps

Comments
3 min read
How to Make DigitalOcean Markdown Vim Plugin

How to Make DigitalOcean Markdown Vim Plugin

1
Comments
11 min read
RazzShell 1.0.2: A Cyberpunk-Inspired Unix Shell with Real-time Monitoring

RazzShell 1.0.2: A Cyberpunk-Inspired Unix Shell with Real-time Monitoring

Comments
3 min read
7 Critical Linux Logs You Should Review After a Security Incident | by Faruk Ahmed | nextgenthreat | Apr, 2025

7 Critical Linux Logs You Should Review After a Security Incident | by Faruk Ahmed | nextgenthreat | Apr, 2025

Comments
1 min read
6 Signs Your Linux Server Might Be Compromised (And What to Do Next) | by Faruk Ahmed | May, 2025

6 Signs Your Linux Server Might Be Compromised (And What to Do Next) | by Faruk Ahmed | May, 2025

Comments
1 min read
5 Linux Commands Hackers Use (And How to Detect Them on Your Server) | by Faruk Ahmed | Apr, 2025

5 Linux Commands Hackers Use (And How to Detect Them on Your Server) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
Securing Your DNS Server in Red Hat Linux Against Attacks

Securing Your DNS Server in Red Hat Linux Against Attacks

Comments
3 min read
Creating a Linux VM on Azure

Creating a Linux VM on Azure

Comments
1 min read
Why ARP Matters !!!

Why ARP Matters !!!

Comments
3 min read
Fortify Your SSH: Lock Out Root, Shift Ports, Key In Security.

Fortify Your SSH: Lock Out Root, Shift Ports, Key In Security.

7
Comments
3 min read
How I Spot a Suspicious Process on My Linux Server (Before It Does Damage) | by Faruk Ahmed | Jun, 2025

How I Spot a Suspicious Process on My Linux Server (Before It Does Damage) | by Faruk Ahmed | Jun, 2025

Comments 1
1 min read
Disk Usage & File System Monitoring in Red Hat Linux

Disk Usage & File System Monitoring in Red Hat Linux

1
Comments
3 min read
🔐 Blog – Single Sign-On (SSO): One Login to Rule Them All

🔐 Blog – Single Sign-On (SSO): One Login to Rule Them All

Comments
2 min read
🛠 Bind Mount and 2 Other Useful Linux Commands (Updated for 2025)

🛠 Bind Mount and 2 Other Useful Linux Commands (Updated for 2025)

Comments
1 min read
Process Management in Red Hat Linux

Process Management in Red Hat Linux

1
Comments
3 min read
Never get caught off guard: Receive your server's health every minute by Email

Never get caught off guard: Receive your server's health every minute by Email

Comments 2
6 min read
🐧 What’s in a Linux Desktop? A Beginner’s Guide to Ubuntu Applications

🐧 What’s in a Linux Desktop? A Beginner’s Guide to Ubuntu Applications

Comments 1
2 min read
🐧Penguin Scripting Suite: v.1.0

🐧Penguin Scripting Suite: v.1.0

1
Comments
3 min read
From SysAdmin to DevOps: My Journey Into Cloud Automation

From SysAdmin to DevOps: My Journey Into Cloud Automation

Comments
1 min read
Get Hands-On with Red Hat Linux: Set Up Your Ultimate Practice Lab

Get Hands-On with Red Hat Linux: Set Up Your Ultimate Practice Lab

1
Comments
2 min read
loading...