YOUR HOME FOR LINUX-RELATED FUN AND LEARNING

Connect with Learn Linux TV:

  • YouTube
  • LinkedIn
  • GitHub
  • Patreon
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance

All Content

⇨

see all

  • A Linux PC in the palm of your hand! The Pantera Pico PC from XDO

    In this video, Jay provides a quick review of the Pico PC from XDO, which is the smallest Linux PC that’s ever been reviewed on the channel. The Pico PC claims to be ultra quiet and fully compatible with Linux. Check out this review and find out if the Pico PC lives up to its claims.

    YouTube player

    ⇨

    Read more: A Linux PC in the palm of your hand! The Pantera Pico PC from XDO
  • Linux Crash Course – sudo

    When you need to run Linux commands with elevated privileges, sudo is the tried and true method to run commands as another user (such as root). In this introductory tutorial, we’ll take a look at some of the inner-workings of sudo.

    YouTube player

    ⇨

    Read more: Linux Crash Course – sudo
  • Enterprise Linux Security Episode 16 – Library Poisoning

    We’ve discussed supply-chain attacks in the past, and now it’s time to see an actual example that happened recently. However, this particular incident is especially unique as the libraries in question were allegedly poisoned by the actual developer. In this episode, Joao and Jay discuss the recent sabotage regarding two very popular NPM libraries.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 16 – Library Poisoning
  • The Homelab Show Episode 43: Questions & Answers

    It’s time for yet another Q&A episode of The Homelab Show. In this episode, Jay and Tom answer your questions about networking, security, and more!

    YouTube player

    ⇨

    Read more: The Homelab Show Episode 43: Questions & Answers
  • The Homelab Show – Episode 42: Security Onion

    In the 42nd episode of The Homelab Show (where does the time go?!) Jay and Tom Discuss Security Onion. It’s definitely a very appealing solution for enhancing your security.

    YouTube player

    ⇨

    Read more: The Homelab Show – Episode 42: Security Onion
  • The Homelab Show Episode 41 – Network Segmentation

    Networking is often a difficult subject for newcomers, as some of the concepts are not always the easiest to explain. Since networking is an important element of homelab, it’s definitely something you’ll want to focus on. Network segmentation in particular can give you a foundation on which to build better security rules, but how do you implement it? What’s the actual benefit of segmentation? In this episode, Jay and Tom discuss some foundational concepts around network segmentation specific to homelab.

    YouTube player

    ⇨

    Read more: The Homelab Show Episode 41 – Network Segmentation
  • Hands-on with the Turing Pi 2!

    The Turing Pi 2 is quite an exciting project that might even be a game-changer when it comes to homelab. With it, you can set up Raspberry Pi Compute Modules as individual servers, and even cluster them! The Turing Pi 2 gives you access to many additional features that Compute Modules wouldn’t normally have access to, such as mPCIe, SATA, and more. This gives you access to build a data-center in a box, and Jay gives it a first-look on the channel in this video.

    YouTube player

    Relevant links

    Check out the Turing Pi 2

    (more…)

    ⇨

    Read more: Hands-on with the Turing Pi 2!
  • The Homelab Show Episode 40 – The Turing Pi 2

    Happy New Year! In their first podcast of 2022, Jay and Tom talk about the Turing Pi 2. The Turing Pi 2 is a mini-ITX board that supports up to four Raspberry Pi Compute Modules and/or Nvidia Jetson modules, effectively giving you a “data center in a box”. Check out this episode for some thoughts on how this might be a game changer for homelab.

    YouTube player

    ⇨

    Read more: The Homelab Show Episode 40 – The Turing Pi 2
  • Resetting OpenSSH Host Keys (the easy method)

    When creating a deployment image or template for distributing Linux to devices or servers, it’s a good idea to make sure that you reset the host keys for SSH. In this video, I’ll show you an easy method I found for automating this.

    YouTube player

    You can find the systemd unit file I used in the video here.

    (more…)

    ⇨

    Read more: Resetting OpenSSH Host Keys (the easy method)
  • Enterprise Linux Security Episode 14 – Recovering from Disasters

    Disasters in the world of tech are frustrating for everyone, not just the company that experienced the incident. In this episode, Jay and Joao discuss thoughts around what it actually means to recovery from a disaster, and why it’s typically not a quick process.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 14 – Recovering from Disasters
  • The Log4Shell Vulnerability, and CrowdSec’s Community Response

    TheLog4Shell vulnerability is taking the Internet by storm, and it’s already being used for real-world attacks. In this video, Jay discusses the details around Log4Shell vulnerability in Log4j, and also CrowdSec’s community-based response to the situation.

    YouTube player

    Relevant links:

    • CVE information
    • Rapid7 article
    • Tech Republic Article (includes test script)
    • DataDog article
    • Github IP list for this CVE
    • CrowdSec pull request #311
    • CrowdSec YAML code
    • CrowdSec http-cve collection

    ⇨

    Read more: The Log4Shell Vulnerability, and CrowdSec’s Community Response
  • Enterprise Linux Security Episode 13 – Log4Shell

    The Log4Shell vulnerability is making its rounds all over security news sites, and with good reason – it’s quite easy to execute. In this episode, Jay and Joao discuss the vulnerability that exists within log4j, as well as some ways to keep your server safe.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 13 – Log4Shell
Previous Page
1 … 28 29 30 31 32 … 50
Next Page
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.