When you write software, there’s no reason to reinvent the wheel – shared libraries and other resources exist to enable you to create applications while avoiding redundant work. Unfortunately, sometimes the software supply itself chain is attacked, which would mean that your application contain malware or security threats you didn’t account for. In this episode of Enterprise Linux Security, Joao and I discuss supply chain attacks, as well as some ways to mitigate this threat.
Universal Linux Apps/Packages (Flatpaks, Snaps, AppImages) seem to get a lot of hate in the Linux community, but why?! In this video, I talk about why this type of technology is not only necessary, but a good thing.
Public Key Authentication with OpenSSH is preferred, as it’s a much stronger method of authenticating to your servers when compared to using password authentication. In fact, password authentication in OpenSSH should always be disabled. But before you can password authentication, you’ll need to set up public key authentication, and that’s exactly what we’ll do in today’s video.
Welcome back to LearnLinuxTV’s full course on Proxmox Virtual Environment! In class #8, we look at the process of converting a container into a template, that can then be used as a basis for launching additional containers.
As Linux server administrators, we need to be able to schedule tasks to run at some point in the future. Perhaps as a one-off command, or a job that’s expected to repeat on some sort of schedule. And that’s exactly what Cron helps us to do – by setting up a Crontab, we can schedule tasks to run at some point in the future.