YOUR HOME FOR LINUX-RELATED FUN AND LEARNING

Connect with Learn Linux TV:

  • YouTube
  • LinkedIn
  • GitHub
  • Patreon
  • Latest Updates
  • Courses
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance
  • Paid Course Access

All Contentzzzzz

⇨

see all

  • Enterprise Linux Security Episode 74 – Unlucky in Vegas

    There’s a multitude of ways you can lose money in Las Vegas, but this time it’s not from gambling. In this episode, Jay and Joao will discuss a recent and still developing story where MGM was the target of what appears to be a ransomware attack.

    YouTube player

    Thanks to TuxCare for sponsoring this podcast! Check them out and make your life as a SysAdmin much easier!

    Relevant Articles

    • What Happens in Vegas: MGM Reports ‘Ransomware’ Attack
    • Cybersecurity the Biggest Challenge for Smaller Organizations

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 74 – Unlucky in Vegas
  • Linux Crash Course – Easy Terminal Commands for Inspecting Hardware

    In the 60th episode of the Linux Crash Course series, you’ll learn some easy-to-use commands you can use to inspect hardware. These commands will help you list PCI devices, view information about your CPU, and more!

    YouTube player

    Thanks to Akamai for sponsoring this episode! Check out their awesome cloud platform where you can spin up your very own Linux Servers with $60 in starter credit.

    ⇨

    Read more: Linux Crash Course – Easy Terminal Commands for Inspecting Hardware
  • Enterprise Linux Security Episode 71 – Internet DRM

    In this episode, Jay and Joao talk about two recent news developments that may have important implications on the overall industry. First, In response to Microsoft’s recent Azure debacle, a US Senator calls for a probe to look into the matter. Second, our main story is yet another facepalm worthy idea from Google that aims to add “integrity” to our browsers, but it’s oddly lacking in said integrity and almost completely devoid of common sense. Google’s “Web Integrity Protection” seems to protect only their ad dollars while making browsing more tedious for the end-user. Will it pass? What is it exactly? Jay and Joao have all the answers in this episode!

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    Relevant Articles

    • Microsoft mitigates China-based threat actor Storm-0558 targeting of customer email
    • Senator calls for probe in Microsoft breach
    • Vivaldi’s Take on Google’s “Web Integrity Protection”
    • Ars Technica article on Web Integrity Protection
    • Web Integrity Protection Github page

    ⇨

    Read more: Enterprise Linux Security Episode 71 – Internet DRM
  • 2023 Homelab Tour – TrueNAS, Proxmox, and More!

    In this video, Jay shows off some of the services that run in his homelab! This time around, we’ll take a look at TrueNAS, Proxmox, and even get a sneak peak at the provisioning solution known internally as “NodeForge”. This is more of an introductory video, additional videos will be considered for diving into even more detail!

    Thanks to Akamai for sponsoring this video! Support Learn Linux TV and set up your own cloud server with Akamai’s Connected Cloud.

    ⇨

    Read more: 2023 Homelab Tour – TrueNAS, Proxmox, and More!
  • Enterprise Linux Security Episode 70 – The Red Hat Saga Continues

    The ongoing saga with Red Hat continues, and now that some time has passed since their controversial announcement, we now have statements from other distributions, including (but not limited to) Oracle and SUSE. In this episode, Jay and Joao talk about the recent developments on this story, and also touch on some trouble that Fortigate has been having nowadays.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    Relevant Articles

    • Oracle’s Statement
    • SUSE’s Statement
    • Fortigate Breach
    • FortiNAC CentOS Documentation (PDF)

    ⇨

    Read more: Enterprise Linux Security Episode 70 – The Red Hat Saga Continues
  • How to Use the rsync Command to Transfer Files (Linux Crash Course Series)

    The rsync command is kind of like a “swiss army knife” of file transfer utilities. With a wealth of options available, it’s easily one of the best methods of moving files around. In this video, Jay goes over the finer points of the rsync command, with an emphasis on the most important options you should know for day-to-day usage.

    YouTube player

    Thanks to Akamai for sponsoring today’s video! Check out their connected cloud platform for your own awesome Linux server!

    (more…)

    ⇨

    Read more: How to Use the rsync Command to Transfer Files (Linux Crash Course Series)
  • Linux Crash Course Series – Using the passwd Command

    The passwd command is what you use to change your password on your Linux system, but did you know you can also use it to change the password of other users, lock accounts, and view statistics? In this video, you’ll learn about the passwd command – and there may even be a new thing or two to learn even if you’re already familiar with the command.

    YouTube player

    (more…)

    ⇨

    Read more: Linux Crash Course Series – Using the passwd Command
  • Enterprise Linux Security Episode 69 – Red Hat vs Enterprise IT

    When it comes to Linux in the Enterprise, we have quite a few challenges we have to overcome on a day to day basis to ensure we can depend on our technology. We never thought Red Hat themselves would some day become our opponent, but here we are. In this episode, Jay and Joao will discuss discuss the latest impulsive and irresponsible decision Red Hat has made – as well as how that decision results in the company undermining their own customer base, while alienating the Linux Community at the same time.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    Relevant Articles

    • Red Hat’s Announcement
    • Response from Jeff Geerling (frequent contributor to open-source)
    • Red Hat strikes a crushing blow against RHEL downstreams
    • Response from Mike McGrath (Red Hat) regarding these changes
    • Response from Learn Linux TV

    ⇨

    Read more: Enterprise Linux Security Episode 69 – Red Hat vs Enterprise IT
  • The Homelab Show Episode 102: Red Hat & Why Open Source Is Hard

    When it comes to Open Source, there’s always debates about various aspects of it – this isn’t new. But recently, a decision made by Red Hat has put a spotlight on this issue, perhaps a larger spotlight than any other time in recent memory. But it’s not just them – Open Source is sometimes a difficult subject to navigate. In this episode, Jay and Tom will discuss the Red Hat thing a bit, but transition into a much bigger topic – what should we or shouldn’t we expect from open source?

    YouTube player

    ⇨

    Read more: The Homelab Show Episode 102: Red Hat & Why Open Source Is Hard
  • CrowdSec 1.5 Gains New Features – Exploring Block Lists, Post Exploitation Behavior & More!

    CrowdSec is a service that aims to enhance the security of your Linux server – which it does in a very interesting way. Leveraging the power of the very “crowd” it serves, CrowSec is able to build intelligence that benefits every server that has it installed. This service has been discussed on the channel before, but in this tutorial you’ll see some of the new features as of CrowdSec 1.5.

    YouTube player

    ⇨

    Read more: CrowdSec 1.5 Gains New Features – Exploring Block Lists, Post Exploitation Behavior & More!
  • Enterprise Linux Security Episode 67 – No One Else’s Computer

    We’ve all heard the cloud referred to as “Someone Else’s Computer”, but what do you do if you find your data is on No One Else’s Computer? In this example, there was a happy ending (data was restored) but it’s still an important consideration all the same. What do you do if your cloud provider all of a sudden doesn’t have your data? In this episode, Jay and Joao discuss a recent situation in which Azure customers found themselves in a bit of a bad situation.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (smaller file size, lower bitrate)
    • Ogg version

    Relevant Articles

    • Azure DevOps Outage in South Brazil
    • This typo sparked a Microsoft Azure outage

    ⇨

    Read more: Enterprise Linux Security Episode 67 – No One Else’s Computer
  • Debian 12 “Net Install” Installation Walkthrough

    Debian is a distribution loved by many, and one of the most popular of all time. If you’re thinking of installing it on your computer, then this installation guide will cover the “Net Install” method from beginning to end. In this video, you’ll see the process of wiping your drive and replacing your OS with Debian from start to finish!

    Note: The installation screen captures are a lower resolution than normal due to a screen recorder issue.

    YouTube player

    Thanks to Akamai for sponsoring today’s video! Check out their awesome cloud platform to get set up with your very own Linux server!

    ⇨

    Read more: Debian 12 “Net Install” Installation Walkthrough
Previous Page
1 … 3 4 5 6 7 … 20
Next Page
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.