News

If a bad actor has hacked your server, they might still be signed in. The easiest way to check if this is the case is to connect to your Linux server via SSH and run: w This simple one-letter command ...
Log4j is a serious vulnerability that has swept across the IT landscape quickly. Here's a single command you can run to test and see if you have any vulnerable packages installed.
Jack Wallen shows you an easy way to determine if your Linux server is under a DDoS attack and how to quickly stop it.
Unix/Linux computers use “caching” to improve disk I/O. In a disk caching design a portion of main memory is used to store temporary copies of the blocks of data that are permanently stored on ...