The post walks you through installing Darkstat on the most common Linux flavours—Debian/Ubuntu, CentOS/RHEL and Fedora/RHEL 9+—with straightforward apt‑y or dnf commands that pull a ready‑made binary from EPEL. It then shows how to tweak `/etc/darkstat.conf`, setting your interface, port, log size and exposing the web UI so you can reach it from outside localhost. Next the article explains what the dashboard displays: overall traffic counts, top talkers, protocol pie charts and a 24‑hour trend line, and it even shares an anecdote about a smart thermostat spiking data usage during firmware updates. Finally it covers practical housekeeping like log rotation, sanity checks when no packets show up, and urges you to investigate odd spikes as clues to hidden network activity.
This guide explains how to keep hard drives healthy by installing and configuring smartctl on both CentOS 8 / RHEL 8 and Ubuntu 20.04, showing the steps needed to pull in the required repositories, install the package, and verify the version. On CentOS systems it walks through enabling EPEL, using dnf to grab smartmontools, identifying disks with lsblk, running a quick SMART report, and then creating a small shell script that logs health status and optionally emails alerts while scheduling it with cron for daily execution. For Ubuntu users it mirrors the installation process with apt, demonstrates a simple single‑line health check, and then sets up a modern systemd service and timer pair that runs smartctl each day, letting you query the timer status whenever you need to see when checks occurred. The article closes by sharing a real‑world incident where an abrupt power loss caused a sudden spike in reallocated sectors, illustrating how daily monitoring could have saved data, and it encourages readers to stick scripts or timers in place to avoid surprise failures.
OSTechNix published eight methods to rename multiple files at once in Linux.
Linoxide published a tutorial about installing TensorFlow on Ubuntu 20.04.
Howtoforge published a tutorial about installing TaskBoard with Apache and let's Encrypt SSL on Debian 11.
FOSS Linux takes a look at the top new features in Fedora Workstation 35.
It's FOSS shows you how to switch to Dark Mode in Fedora Linux.
OSTechNix shows you how to find a package version in Linux.
The guide explains why turning off directory browsing on web servers is essential for security and then walks the reader through simple steps for both Apache and Nginx. For Apache you can edit the main configuration or drop an .htaccess file containing “Options -Indexes” to remove the Indexes flag that otherwise generates a listing of every file in a folder without an index page. On Nginx the solution is even shorter: add “autoindex off;” inside the server block and then test and reload the service to apply the change. A quick checklist table summarizes the flags for each server, and the article ends with reassurance that disabling directory browsing is a trivial but powerful security measure.
The guide walks readers through setting up an SSH server inside a Docker container so they can log in like a regular Linux box, even when the container is running on a remote host. It explains that while docker exec can run commands, SSH provides a true login shell for debugging services that expect interactive input or need to be accessed from another machine, and it walks through choosing an image, installing OpenSSH, creating a non‑root user, exposing port 22 (often remapped to 2222), and ensuring sshd starts via a simple entrypoint script. After the container is up, users can simply SSH into it with the provided credentials, run commands, test connectivity, or reset passwords as needed, and when finished clean everything up by stopping and removing the container and any temporary image. Finally, the article acknowledges that for most command execution cases docker exec suffices, but having an SSH session is valuable when a full terminal experience across machines is required.
Linux Nightly published a tutorial about converting PNG Images to WebP on Linux.
Linux Shout shows you how to install security patches or updates automatically on Rocky or AlmaLinux 8.
Vitux published eight ways to boost Nginx for better performance.
Linux Shout published a tutorial about installing Podman on Rocky Linux 8 or AlmaLinux to run containers.
TecMint takes a look at 22 useful terminal emulators for Linux.
Dedoimedo published a tutorial about how to change the color of active windows in Plasma.
This guide walks readers through turning a new Elasticsearch cluster from an open‑to‑everyone service into a locked‑down system by enabling X‑Pack Security. It starts with simple prerequisites such as having 7.x or 8.x installed, enough RAM, and root access, then explains how to turn on the security module in `elasticsearch.yml` and set up TLS for both node‑to‑node and client traffic. Next, it covers generating a CA and server certificates with OpenSSL, creating keystore and truststore entries, restarting Elasticsearch, configuring Kibana’s connection string, and finally creating or resetting admin users via the Security API. The article finishes with practical troubleshooting hints and reminds readers that once these steps are completed the cluster is secure against anonymous access and unencrypted data exposure.
This guide shows how to extract every ounce of speed from an Nginx server by applying straightforward, practical tweaks that you can implement immediately. It covers worker process sizing, connection limits, keep‑alive settings, sendfile and TCP optimizations, gzip compression levels, static asset caching, HTTP/2 enablement, SSL hardening, real‑time monitoring, and essential operating‑system adjustments. Rather than relying on new hardware, the focus is on making the software run efficiently, with examples that demonstrate measurable gains such as reduced response times, lower handshake latencies, and higher throughput. Readers are encouraged to adjust one setting at a time, observe the impact on performance metrics, and gradually build a lean, high‑performance Nginx deployment.
The article opens by framing Ncat as a compact, Swiss‑Army‑knife tool bundled with the Nmap family that can act as a client, server, or tunnel for network sockets. It then walks through creating a quick TCP listener—using flags like -l and -k to stay alive—and shows how to pipe incoming data straight into a file so you can capture logs or payloads without writing extra code. The guide continues with practical tricks such as tunneling traffic over restrictive firewalls by chaining --sh-exec on one side with a remote -c command, and it warns of the pitfalls that arise when an accidental listener receives garbage data, even offering a reversible shell example while cautioning against exposing -e to public networks. Finally, a list of handy tips—including verbose output for debugging, optional TLS encryption, careful use of -e on trusted hosts, and detaching listeners with -d—concludes that Ncat’s lightweight flexibility can replace dozens of custom scripts when you need something fast and unobtrusive.
Linoxide published a tutorial about how to install and run Lynis on Ubuntu Linux.