News

Log files are the most valuable tools available for Linux system security. The logrotate program is used to provide the administrator with an up-to-date record of events taking place on the system.
The examples described in this post work on Ubuntu and related Linux systems. Other systems might use different log file and configuration file names, but the process itself should be very similar.
If you really want to see what's happening beneath the hood of your Linux distribution, you need to use log files.
Did you know that Linux makes it easy to create and use hidden files, which means you can easily tuck important documents away from plain sight? Here's how to manage those files.
By default, klogd directs log messages from the kernel to the system logger, which is why most people don't need to worry about klogd. You can control the handling of kernel messages by editing the ...
Core concept: OSTree stores full system snapshots in a content-addressed manner, like Git for binary trees. Updates are ...
It's not hard to look up configuration details on your Linux system. The hard thing is wrapping your brain around how many are available and what they can tell you.