How to install Brave on Linux

How to install Brave on Linux

Brave is a free and open source web browser focused on providing a privacy-oriented setup by default. It is released under the Mozilla Public License Version 2.0, and it is based on chromium, which is also the open source foundation upon Google Chrome is built.  Brave comes with useful built-in features such an ad-blocker, a private search engine, an integrated VPN, and Tor support.

Read more

Changing File Permissions on NTFS Partitions in Linux

Changing File Permissions on NTFS Partitions in Linux

NTFS stands for New Technology File System and is developed by Microsoft for use on their Windows operating systems. NTFS is not normally used on Linux systems, but has been the default file system on Windows for many years. Linux users are probably used to seeing drives with the ext4 file system, which is ordinarily the default and certainly the most widespread in the Linux realm.

Read more

Understanding chmod: The Difference Between u+x and +x

Understanding chmod: The Difference Between u+x and +x

The chmod command is used to assign permissions on files and directories within a Linux system. Chmod can accept many varying syntaxes, such as symbolic mode and absolute mode, therefore it can be a little confusing when learning all the different ways that chmod can be used. When it comes to granting a user execute permissions, the u+x and +x options are often used because of their simple and straightforward syntax. But do you know the difference between these two options?

Read more

Assigning File Permissions to Specific Users with chmod and setfacl

Assigning File Permissions to Specific Users with chmod and setfacl

The Linux operating system allows users to assign granular permissions to all files and directories. Ordinarily, it is sufficient to hand out read, write, and/or execute permissions to individual user accounts or groups of users by utilizing the chmod command. But it is also possible to set granular permissions on a per user basis by configuring access control lists.

Read more

Granting Full User Rights to a Folder and Its Contents in Linux

Granting Full User Rights to a Folder and Its Contents in Linux

Sometimes it is necessary to grant full user rights on an assortment of files in your Linux system. You may have dozens, hundreds, or even thousands of files on which a user needs read, write, and execute permissions in order to fully access and utilize them. In such scenarios, it can be useful to grant full user rights on an entire directory, which gives blanket permissions on all of the directory’s file contents and subdirectories.

Read more

Changing Your Ubuntu Username and Home Directory Without Losing Application Settings

Changing Your Ubuntu Username and Home Directory Without Losing Application Settings

Changing the username on a Linux system can seem a bit tricky at first. After all, there are tons of application settings, system services, file permissions, and configuration files that rely on the username in order to function smoothly. Suddenly changing the name can have adverse and unexpected effects on your system, and will cause certain things to stop working if you do not manage to change the username using the proper method.

Read more

Retrieving File Permissions in Octal Mode Using the Command Line

Retrieving File Permissions in Octal Mode Using the Command Line

File permissions on a Linux system can be represented in either symbolic mode or octal mode. Using octal mode to represent file permissions is a little more succinct, since we can usually list all relevant file permissions with just three numbers. These numbers represent the owner, group, and other user permissions for any file or directory on Linux. In this tutorial, you will see how to get a listing of file permissions in octal mode representation on the Linux command line.

Read more

how to manage groups on Linux

How to manage groups on Linux

Groups are an essential part of how discretionary access control (DAC) is implemented on Linux and, in general, on any Unix-based operating system. The creation, modification, and removal of groups are relatively straightforward operations which can be carried out using some utilities installed by default.

Read more

Introduction to Linux capabilities

On Linux, traditionally, a process could either run as root, and so have limitless access to the system, or as a non-root user, subject to a set of restrictions. Since version 2.2 of the kernel, capabilities were introduced as a way to grant permissions in a more granular way.

Read more

How to bind a rootless container to a privileged port on Linux

One of the main innovations introduced by Podman was the ability to run rootless containers. Security wise, this was a big improvement, since a potentially compromised container running as root represents a security threat for the host system. In order to obtain a similar behavior, recent versions of Docker support running the docker daemon in the user context. Running unprivileged containers, albeit more secure, has also its drawbacks, as the inability to bind to privileged host ports.

Read more

How to check Bluetooth status on Raspberry Pi

How to check Bluetooth status on Raspberry Pi

All of the latest Raspberry Pi models have Bluetooth built in, giving users another medium by which they can connect their peripheral devices such as headphones, keyboard, mouse, etc. Ideally, Bluetooth devices should be easy to connect to your Raspberry Pi. The connection process usually involves making your peripheral device discoverable, and then selecting the devices from the Bluetooth list on your Raspberry Pi.

Read more