Satish Kumar

Satish Kumar

937 Articles Published

Articles by Satish Kumar

Page 11 of 94

AppArmor vs. SELinux Comprehensive Comparison

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

In the world of cybersecurity, there are two commonly used tools for enforcing mandatory access control (MAC) policies on Linux systems: AppArmor and SELinux. Both of these tools provide a layer of security by limiting actions that a particular process or application can take on a system. In this article, we will be taking a comprehensive look at both AppArmor and SELinux and compare their features and capabilities. Overview of AppArmor and SELinux AppArmor and SELinux are both Linux Security Modules (LSMs) that can be used to protect a system from various security threats. They are designed to ...

Read More

How to Format USB Drives in Linux?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 4K+ Views

USB drives are portable storage devices that have become essential for data storage and transfer in modern computing. They are small, lightweight, and provide an easy way to move files between different computers or create bootable media for operating system installations. With increasing storage demands, USB drives have evolved to offer larger capacities and faster transfer speeds, making them indispensable tools for both personal and professional use. Understanding File Systems in Linux A file system is responsible for organizing and managing files, directories, and metadata such as permissions, ownership, and timestamps. Linux supports various file systems, each ...

Read More

How to Disconnect Inactive or Idle SSH Connections in Linux?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 19K+ Views

Secure Shell (SSH) is a protocol that enables secure communication between two systems. In Linux, SSH is widely used to remotely access and manage servers. However, idle or inactive SSH connections can pose security risks and consume system resources unnecessarily. This article explains how to identify and disconnect such connections to maintain system security and performance. Identifying Inactive or Idle SSH Connections Before disconnecting inactive SSH connections, you must first identify them. Linux provides several commands to list active users, display session information, and monitor connection states. Using the 'who' Command The who command displays currently ...

Read More

How to make a USB device multi-touch enabled

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

In recent years, touch technology has become increasingly popular, with smartphones, tablets, and laptops offering the capability to interact with devices by simply tapping or swiping the screen. However, what if you could use touch technology on your computer using a USB device? This is where the concept of multi-touch enabled USB devices comes into play. In this article, we will explain what multi-touch enabled USB devices are, how to make a USB device multi-touch enabled, and provide examples of popular multi-touch USB devices in the market. What are Multi-touch Enabled USB Devices? Multi-touch enabled USB devices are ...

Read More

Apropos Linux Command Explained {With Examples}

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

If you're someone who frequently uses Linux, you may have come across the term apropos while using the terminal. Apropos is a very useful Linux command that helps users find commands related to a specific topic or keyword. In this article, we will take a closer look at the apropos command and explain its usage with several examples. What is Apropos? Apropos is a command-line utility in Linux that searches manual pages for a keyword or topic and returns a list of relevant commands. It is a great tool for quickly finding commands you need, especially if you ...

Read More

How to Forward Ports With Iptables in Linux?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 2K+ Views

Port forwarding is a technique that allows external devices to access services running on internal network devices by redirecting traffic through specific ports. When you want to run a web server from your home computer, external users need to connect through your public IP address via port 80 (HTTP) or port 443 (HTTPS). Without proper port forwarding configuration, incoming connection requests are blocked by your router's firewall, preventing access to internal services. Iptables is a powerful Linux firewall utility that operates at the kernel level, providing robust packet filtering, NAT (Network Address Translation), and connection tracking capabilities. It can ...

Read More

Linking with x86 shared library on Linux x64

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 522 Views

Dynamic Link Libraries, also known as Shared Libraries, are collections of compiled code, data, and resources that can be loaded and executed by an application at runtime. Shared libraries are commonly used in development of Linux applications and are an integral part of x86 architecture. In this article, we will explore the process of linking with x86 shared libraries on Linux x64 systems. Understanding x86 Shared Libraries An x86 shared library is a file that contains compiled code, data, and resources that can be shared among multiple applications at runtime. Shared libraries are loaded into memory only when ...

Read More

A Guide To Buying A Linux Laptop

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

Linux is a popular open-source operating system that is favored by many programmers, developers, and tech enthusiasts. If you're looking to buy a Linux laptop, you may be wondering where to start. In this guide, we'll go over everything you need to know before making a purchase, including hardware requirements, compatibility, and popular brands. Hardware Requirements for a Linux Laptop Before diving into specifics of different Linux laptop models, it's important to know what hardware requirements your laptop should have to run Linux smoothly. The good news is that Linux doesn't require a lot of computing power, so ...

Read More

Apt Linux Command with Examples

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

If you are using Linux as your operating system, then you might be familiar with the apt command. APT stands for "Advanced Package Tool" and it is a package manager used in Linux distributions like Ubuntu, Debian, and others. APT is a command-line tool that allows users to search, install, remove, and manage software packages on their Linux system. Basic Package Management Operations Updating Package Lists Before installing any package on your Linux system, it's important to update package lists. APT uses package lists to know which packages are available for installation. sudo apt update ...

Read More

How to Do Security Auditing of Linux System Using Lynis Tool?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 356 Views

In today's world, where cyber threats and attacks have become more sophisticated and frequent, it is imperative to secure computer systems against malicious activities. A security audit is a systematic evaluation of the security of a computer system or network, which involves identifying potential vulnerabilities and addressing them before they are exploited by attackers. In this article, we will discuss how to perform a security audit on a Linux system using the Lynis tool. What is Security Auditing? Security auditing refers to the process of evaluating the security posture of a computer system or network by examining its ...

Read More
Showing 101–110 of 937 articles
« Prev 1 9 10 11 12 13 94 Next »
Advertisements