Recently, some interesting security news has occurred, and two specific developments are the main discussion in this episode. Trojan Source is a newly discovered tactic that can be used to hide malicious code and execute something completely unexpected, even when the source code appears to be syntactically correct. In addition, CISA recently mandated a large number of CVE’s to be patched in the very near future, which will likely have ramifications even outside of the United States. Also, Jay and Joao also discuss the recently released Fedora 35, which is a distribution that has a large presence on the workstations that administrators use.
Remaining on legacy Linux distributions can lead to additional security risks as time goes on, and migrating to a newer and better supported distribution can be a very difficult endeavor for most administrators. In this episode, Jay and Joao are joined by Jack from AlmaLinux, and we talk about ELevate – a tool that can be used to migrate from a distribution in the Enterprise Linux family to another Enterprise Linux distribution. This helps alleviate some of the burden of distro migration, and as a community project it’s also a great project to get started with contributing to an open-source project.
Fedora 35 was released on November 2nd of 2021, and brings with it the latest GNOME experience and various tweaks and improvements. Could this be the best GNOME desktop of 2021 so far? In this review, we’ll take a look at it and see how it stacks up.
Although there’s no such thing as a “perfect” deployment image, including some sane defaults into your images and templates can save you a lot of work down the road, and also give you the opportunity to include more secure defaults. In this episode, we’ll discuss deployment image defaults as well as some recent news.
I recently had a chance to chat with Benny Vasquez, who was recently named the Chair of the Board of Directors for AlmaLinux OS. In this conversation, we chat about some of the things that led to the creation of AlmaLinux itself, the community-focused and inclusive nature of the project, the new board position, and more!
Setting up a Bastion Server can be a useful method of gaining access to your Homelab from external networks. In addition, it’s also a popular attack target for intruders. In this episode, Tom and Jay discuss what a Bastion Server is, and some recommended adjustments to help make it more secure.
In this episode of Linux Essentials, we’ll take a look at how to send tasks to the background, and then bring them to the foreground. This helps you get the current task out of the way so you can switch to something else, without having to use multiple terminal windows.
Thank you to Linode for sponsoring this video. Check them out and get your very own Linux server in minutes!
Aliases in Bash enable you to essentially create your own commands, or even just simplify existing ones. In this video, I’ll explain what aliases are, and I’ll show you some of my personal favorites. At the end, I’ll show you how to make your aliases persist between sessions.
When you write software, there’s no reason to reinvent the wheel – shared libraries and other resources exist to enable you to create applications while avoiding redundant work. Unfortunately, sometimes the software supply itself chain is attacked, which would mean that your application contain malware or security threats you didn’t account for. In this episode of Enterprise Linux Security, Joao and I discuss supply chain attacks, as well as some ways to mitigate this threat.
As Linux server administrators, we need to be able to schedule tasks to run at some point in the future. Perhaps as a one-off command, or a job that’s expected to repeat on some sort of schedule. And that’s exactly what Cron helps us to do – by setting up a Crontab, we can schedule tasks to run at some point in the future.