
Linux Printing with CUPS
1. Introduction Printing is one of those technologies people rarely think about—until it stops working. Despite the rise of paperless workflows, printing remains deeply embedded in both personal a...
1. Introduction Printing is one of those technologies people rarely think about—until it stops working. Despite the rise of paperless workflows, printing remains deeply embedded in both personal a...
Introduction As a Linux administrator, I spend much of my time working on the command line. When I decided to dive back into ESP32 programming, I initially installed the Arduino IDE. However, I qu...
Introduction In the previous article, we explored how to set up accounts for different types of users, including RF Guns, Application Users, Application Developers, and System Administrators, with...
Introduction In my previous article, we discussed how to access a Linux application via SSH and the methods for securing SSH itself. Now, we turn our attention to securing the users of these syste...
While modern software often leans heavily on graphical interfaces and web applications, command-line-based applications are still very much alive and in use. In fact, SSH-based shell applications r...
Introduction With SSH being one of the primary attack vectors in modern infrastructure, hardening the SSH daemon (sshd) is a critical step in any system security strategy. Ideally, your organizati...
Introduction In many cases, a default SSH installation, especially with a few added security tweaks, is perfectly sufficient. But what happens when you’re dealing with a corporate environment wher...
Introduction to SSH Multiplexing In previous discussions, we’ve focused on making remote server access via SSH more secure. This time, let’s shift our focus to performance and usability—specifical...
Introduction Strong security doesn’t have to be complicated. This guide walks through setting up a secure, time-limited SSH access system using a bastion host in a Proxmox Virtual Environment (VE)...
Introduction Modern Linux distributions often include hundreds or even thousands of individual programs. Each one of these programs adds another potential entry point for malicious actors seeking ...