Samba Admin Cheatsheet for Oracle Linux 9
đź§° Samba Admin Cheatsheet for Oracle Linux 9 Quick reference for troubleshooting, securing, and validating Samba shares on Oracle Linux 9. This cheatsheet complements the main setup guide, provi...
đź§° Samba Admin Cheatsheet for Oracle Linux 9 Quick reference for troubleshooting, securing, and validating Samba shares on Oracle Linux 9. This cheatsheet complements the main setup guide, provi...

Making CUPS Classes Work for You “There’s never enough time to do it right, but there’s always enough time to do it over.” — Jack Bergman Time and again, I’ve been on projects where the origi...

Introduction: Shattering the Myth A few years ago, an IT professional I trusted made a statement that stuck with me: Linux is not secure. He didn’t mean Linux was worse than Windows or macOS, but ...

Introduction Running a desktop environment inside a hypervisor isn’t new. Tech enthusiasts and home lab users have been doing it for years with tools like VMware Workstation and VirtualBox. These ...

Introduction As a Linux administrator, you’ll often find yourself assigned to unexpected responsibilities—managing printers being a classic example. My journey with CUPS (Common UNIX Printing Syst...

Introduction In the last article, I introduced what CUPS (Common Unix Printing System) is and how, even in today’s highly digital landscape, printing still plays a key role in supporting business ...

1. Introduction Printing is one of those technologies people rarely think about—until it stops working. Despite the rise of paperless workflows, printing remains deeply embedded in both personal a...

Introduction As a Linux administrator, I spend much of my time working on the command line. When I decided to dive back into ESP32 programming, I initially installed the Arduino IDE. However, I qu...

Introduction In the previous article, we explored how to set up accounts for different types of users, including RF Guns, Application Users, Application Developers, and System Administrators, with...

Introduction In my previous article, we discussed how to access a Linux application via SSH and the methods for securing SSH itself. Now, we turn our attention to securing the users of these syste...