How to Create, Manage, and Expose a Service in Kubernetes

How to Create, Manage, and Expose a Service in Kubernetes

A ‘service’ is a way to make an application accessible from the network in Kubernetes. It involves exposing one or multiple network ports that are tied to a containerized application. For example, you can run a containerized web server and expose it over the network to turn it into a service. This then allows incoming client connections, so in this case users could visit the hosted web server.

Read more

Linux: Setup SSH

Linux: Setup SSH

The SSH protocol allows Linux administrators to log in to any number of remote systems from their own command line terminal. SSH is a client-server service providing secure, encrypted connections over a network connection. This allows us terminal access to other Linux systems or really any device that accepts SSH connections, such as routers and firewalls, and other operating systems.

Read more

How to customize Firefox using the policies.json file

How to customize Firefox using policies

In a world where Google Chrome is, by a large margin, the most used web browser, Firefox represents the only relevant open source alternative. The Mozilla browser is installed by default (or at least available in the official repositories) of all the most used Linux distributions.  In order to configure its behavior we can change settings interactively, or, more conveniently, we can create and deploy “policies”.

Read more

Linux GUI network managers

Linux GUI network managers

GUI based network managers can make it easy to configure the IP, DNS, and routing settings for your Linux system, as well as manage the configured VPNs, known WiFi networks, etc. Users that join many different networks, have multiple VPNs configured, or need to frequently change their networking settings may find it easier to do so in a GUI application rather than fiddling with the command line and ip commands. A network manager provides a centralized location that can keep track of all your settings and even build profiles to quickly change between various presets.

Read more

Can Linux Get Viruses? Exploring the Vulnerability of Linux Systems

The open-source nature of Linux and its reputation for being a secure operating system have led many users to believe that it is immune to viruses. However, the reality is that Linux systems can still get infected by malicious software. In this article, we’ll explore the vulnerability of Linux systems to viruses and the factors that make them less susceptible compared to other operating systems. Additionally, we’ll discuss real-life examples of Linux viruses and provide best practices for keeping your Linux system secure. So, let’s dive in and answer the question: can Linux get viruses?

Read more

Fixing the 'Too Many Open Files' Error on Linux

Fixing the ‘Too Many Open Files’ Error on Linux

Every Linux system imposes some upper limit on the number of files that can be opened simultaneously. If you exceed this limit, you will encounter the Too Many Open Files error. This is a security feature and failsafe to keep the system from becoming overwhelmed, since opening thousands of files is ordinarily unnecessary and indicative of a program gone haywire or a malicious user trying to crash the system.

Read more

Advanced Logging and Auditing on Linux

Advanced Logging and Auditing on Linux

One of the most important aspects of Linux system administration is to set up logging of critical and important events, and regularly audit your server for weaknesses or errors. Since Linux servers are typically powered on 24/7, administrators must rely on logging and auditing tools to help them keep track of what is happening on the system throughout the day. These useful tools can collect and summarize mass amounts of data, notify the sysadmin when a critical event occurs, and identify trends and potential issues.

Read more

How to show/check for open ports on Ubuntu Linux

How to show/check for open ports on Ubuntu Linux

Checking for open ports on Ubuntu Linux is an essential part of security administration. Some Linux software works by listening for incoming connections. A simple example would be a web server, which handles user requests whenever someone navigates to a website. As a Linux administrator or user, it’s important to always know which ports of your system are open to the internet. Otherwise, you could be unaware of outside connections being made to your computer, which consumes bandwidth and resources, along with being a potential security hole.

Read more

Fixing the Error creating sandbox error in Flatpak

Fixing the Error creating sandbox error in Flatpak

One of Flatpak’s most fundamental features is that it runs all applications in their own sandbox. If Flatpak runs into an issue with creating a sandboxed environment for an application, it will issue the Error creating sandbox in your terminal. This may occur either when installing, updating, or running a Flatpak application, since these events trigger Flatpak to attempt to create a new sandbox for the app.

Read more

Understanding Flatpak Security and Permissions

Understanding Flatpak Security and Permissions

One of Flatpak’s best features is its ability to run each installed application in a sandboxed environment, which isolates it from the host system and other apps or services. Flatpak also extends granular sandbox controls to the end user, allowing them to delegate access to apps as they see fit. For example, it is possible to tell Flatpak to allow a certain app to have access to your file system.

Read more

Flatpak: Enhancing Security with Application Sandboxing

Flatpak: Enhancing Security with Application Sandboxing

There are a few reasons for Flatpak’s popularity, but one of its most alluring features is how it utilizes application sandboxing to enhance the security of the host Linux system. Flatpak isolates all applications into their own sandbox environment, so they only have limited access to the host system’s resources and files. This enhances security by ensuring that malicious or vulnerable applications have limited opportunities to compromise any part of the host system.

Read more