
Securing Printers with CUPS Why It Matters
Introduction As a Linux administrator, you’ll often find yourself assigned to unexpected responsibilities—managing printers being a classic example. My journey with CUPS (Common UNIX Printing Syst...

Introduction As a Linux administrator, you’ll often find yourself assigned to unexpected responsibilities—managing printers being a classic example. My journey with CUPS (Common UNIX Printing Syst...

Introduction In the last article, I introduced what CUPS (Common Unix Printing System) is and how, even in today’s highly digital landscape, printing still plays a key role in supporting business ...

1. Introduction Printing is one of those technologies people rarely think about—until it stops working. Despite the rise of paperless workflows, printing remains deeply embedded in both personal a...

Introduction As a Linux administrator, I spend much of my time working on the command line. When I decided to dive back into ESP32 programming, I initially installed the Arduino IDE. However, I qu...

Introduction In the previous article, we explored how to set up accounts for different types of users, including RF Guns, Application Users, Application Developers, and System Administrators, with...

Introduction In my previous article, we discussed how to access a Linux application via SSH and the methods for securing SSH itself. Now, we turn our attention to securing the users of these syste...

While modern software often leans heavily on graphical interfaces and web applications, command-line-based applications are still very much alive and in use. In fact, SSH-based shell applications r...
This hands-on build guide is designed to complement the main article on securing SSH shell applications and works for a quick planning reference. 🛠️ Hands-On Build Guide: Creating a Restricted S...

Introduction With SSH being one of the primary attack vectors in modern infrastructure, hardening the SSH daemon (sshd) is a critical step in any system security strategy. Ideally, your organizati...

Introduction In many cases, a default SSH installation, especially with a few added security tweaks, is perfectly sufficient. But what happens when you’re dealing with a corporate environment wher...