Secure linux

Secure linux смотреть последние обновления за сегодня на .

Quick tips to improve Linux Security on your desktop, laptop, or server (hardening for beginners)

132543
6716
557
00:17:26
04.10.2023

Try out Proton Mail, the secure email that protects your privacy: 🤍 Grab a brand new laptop or desktop running Linux: 🤍 👏 SUPPORT THE CHANNEL: Get access to a weekly podcast, vote on the next topics I cover, and get your name in the credits: YouTube: 🤍 Patreon: 🤍 Liberapay: 🤍 Or, you can donate whatever you want: 🤍 👕 GET TLE MERCH Support the channel AND get cool new gear: 🤍 🎙️ LINUX AND OPEN SOURCE NEWS PODCAST: Listen to the latest Linux and open source news, with more in depth coverage, and ad-free! 🤍 🏆 FOLLOW ME ELSEWHERE: Website: 🤍 Mastodon: 🤍 Pixelfed: 🤍 PeerTube: 🤍 Discord: 🤍 #Linux #security #cybersecurity 00:00 Intro 00:56 Sponsor: Proton Mail 02:32 Software and updates 04:04 Services and SSH 06:38 User management 10:10 Physical Security 11:35 SELinux, AppArmor, and firewall 14:04 Parting Thoughts 15:15 Sponsor: Get a PC made to run Linux 16:30 Support the channel Password complexity tips: 🤍 Tips to secure SSH: 🤍 The more software you use, the larger the attack surface for your Linux install is. It's always good to take a look at all the installed applications, and libraries, and remove what you don't use anymore. You can also remove packages that aren't linked to anything else and aren't used by anything. On Debian or Ubuntu, for example, you can find these by running sudo apt autoremove And on a desktop, you probably already apply updates, or your distro has auto updates enabled. But on a server, it's easy to let things slide, and forget to log in regularly and make sure things are up to date. I'm guilty of that myself. And just like with packages, libraries, and apps, you should also make sure you only run the services you actually use. You can list all services running with: systemctl list-unit-files To stop a service you don't need, you can run systemctl stop SERVICE To stop the service from starting with the system, you can run systemctl disable SERVICE If you're on a server, the general rule of thumb is also NOT to run a graphical desktop on it. It will often be much more secure to use SSH to log in to the server remotely. But you might also need to secure SSH first. If you have multiple users, make sure only the ones who need it have SSH access. To do that, you can edit the /etc/ssh/sshd_config file, and type AllowUsers then the names of the users that will actually have access to SSH. Now, something that might be useful in general, for a server or a desktop, is making sure all the users are correctly handled. The first thing will be to disable root login. If you decide to disable the root account, make sure at least one user has admin privileges though, or you'll have a system without any way to access any task with sudo. Once you're certain everything is ok, you can use the following method: Edit /etc/passwd, and change the first line, by replacing /bin/bash, or whatever other shell root currently logs into, by /sbin/nologin (or /usr/sbin/nologin depending on the distro) If you prefer, you can simply disable root login through SSH, so the account is still there if you want it locally, but remote attackers won't be able to login as root. To do so, you can edit /etc/ssh/sshd_config, and uncomment the PermitRootLogin line, and then set its value to no. Restart SSH with sytemctl restart sshd, and you're done. To remove the ability to use USB, Thunderbolt or Firewire, you can add the following lines to their respective files (create them if need be). To revert this, just remove the lines that have been added in the various files by the commands. Add: install usb-storage /bin/true to /etc/modprobe.d/disable-usb-storage.conf Add blacklist firewire-core to /etc/modprobe.d/firewire.conf Add blacklist thunderbolt to /etc/modprobe.d/thunderbolt.conf

5 Steps to Secure Linux (protect from hackers)

643212
29781
1441
00:23:15
18.03.2021

get access to a FREE Linux server with Linode: 🤍 ($100 credit for signing up) Are your Linux servers safe from hackers? Can they be hacked? In this video, NetworkChuck shows you how to secure and HARDEN your Linux server. While nothing is full-proof, taking these steps to harden your Linux server is VITAL and will help protect you from attacks. ALL THE COMMANDS: 🤍 Shoutout to our sponsor LINODE!! Start using their amazing cloud platform: 🤍 SUPPORT NETWORKCHUCK - ➡️Become a YouTube Member: 🤍 ☕☕ COFFEE and MERCH: 🤍 Check out my new channel, 🤍 🆘🆘NEED HELP?? Join the Discord Server: 🤍 STUDY WITH ME on Twitch: 🤍 READY TO LEARN?? - -Learn Python: 🤍 -Get your CCNA: 🤍 FOLLOW ME EVERYWHERE - Instagram: 🤍 Twitter: 🤍 Facebook: 🤍 Join the Discord server: 🤍 0:00 ⏩ Intro 1:05 ⏩ FREE LINUX LAB 2:51 ⏩ 1. Enable Automatic Updates 4:29 ⏩ 2. Limited User Account 7:02 ⏩ 3. Passwords are for suckers 12:18 ⏩ 4. Lockdown Logins (harden SSH) 15:50 ⏩ 5. FIREWALL IT UP!!! AFFILIATES & REFERRALS - (GEAR I USE...STUFF I RECOMMEND) My network gear: 🤍 Amazon Affiliate Store: 🤍 Buy a Raspberry Pi: 🤍 #linux #securelinux

The COMPLETE Linux Hardening, Privacy & Security Guide!

119400
3954
187
00:18:58
02.07.2021

The ultimate guide showing how to make Linux as secure, private, and anonymous as we can make it. This video covers hardening Linux, security, privacy, anonymity, passwords, authentication, VPNs, biometrics, search engines, browsers, Tor, 2FA, virtual machines, Linux, communication, sandboxing, and more to reclaim your privacy and data today! Go Incognito: 🤍 Become Anonymous Guide: 🤍 Windows Version of this Video: 🤍 MacOS Version of this Video: 🤍 Android Version of this Video: 🤍 iOS Version of this Video: 🤍 Guide Timestamps 00:00 Guide Introduction & Distro Choice 01:40 Linux Zone 1 07:49 Linux Zone 2 14:18 Linux Zone 3 17:51 Final Words & Recap 🔐 Our Website: 🤍 🕵 Go Incognito Course - to learn about privacy: 🤍 🏫 Techlore Coaching - to get direct support: 🤍 💻 Techlore Forum - to connect with other advocates: 🤍 🦣 Mastodon - to stay updated: 🤍 We cannot provide our content without our Patrons, huge thanks to: Afonso, Boori, BRIGHTSIDE, Casper, Clark, Cyclops, Eldarix, JohnnyO, Jon, kevin, Larry, love your content, NotSure, Poaclu, x 🧡 Join them on Patreon: 🤍 💚 To see our production gear, privacy tools we use, and other affiliates: 🤍 💖 All Techlore Support Methods: 🤍 Zone 1 Threat Modeling: 🤍 Passwords: 🤍 Veracrypt Guide: 🤍 Firewall Comparison: 🤍 Techlore Top 5 Best VPNs: 🤍 Techlore VPN Tools: 🤍 PTIO DNS Providers: 🤍 Zone 2 FOSS Pros & Use-Cases: 🤍 Top 5 Private Email Providers: 🤍 Top 5 Messengers For Privacy: 🤍 Deleting Google: 🤍 Go Incognito Passwords Lesson: 🤍 KeePass Guide: 🤍 Bitwarden vs KeePass: 🤍 User Authentication with PAM: 🤍 Go Incognito Browser Hardening: 🤍 Go Incognito MAC Addresses: 🤍 Computer Locks Kickback Link: 🤍 Privacy Screen Protectors Kickback Link: 🤍 Zone 3 SELinux Explained: 🤍 Basic Hardening: 🤍 Intermediate Hardening: 🤍 Advanced Hardening Resources: - 🤍 - (Kickback) 🤍 - 🤍 #linux #privacy #security

APPS & TOOLS to improve LINUX PRIVACY & SECURITY

72692
4772
226
00:16:52
12.04.2023

Get 100$ credit for your own Linux and gaming server: 🤍 Grab a brand new laptop or desktop running Linux: 🤍 👏 SUPPORT THE CHANNEL: Get access to a weekly podcast, vote on the next topics I cover, and get your name in the credits: YouTube: 🤍 Patreon: 🤍 Liberapay: 🤍 Or, you can donate whatever you want: 🤍 👕 GET TLE MERCH Support the channel AND get cool new gear: 🤍 🎙️ LINUX AND OPEN SOURCE NEWS PODCAST: Listen to the latest Linux and open source news, with more in depth coverage, and ad-free! 🤍 🏆 FOLLOW ME ELSEWHERE: Website: 🤍 Mastodon: 🤍 Pixelfed: 🤍 Twitter : 🤍 PeerTube: 🤍 This video is distributed under the Creative Commons Share Alike license. #linux #privacy #security 00:00 Intro 00:31 Sponsor: 100$ Free credit for your Linux or Gaming server 01:31 Encrypt your system or specific folders 03:36 Anti-virus 05:23 Sandboxing and application permissions 07:28 Web monitoring and blocking, & VPNs 10:08 Portable private Operating system 11:08 Web browsers & search engines 12:58 Other tools 14:40 Sponsor: Get a PC that runs Linux perfectly, from Tuxedo 15:37 Support the channel A lot of Linux distributions will offer to encrypt your hard drive when you install them. Ubuntu, PopOS, elementary OS, and a lot more, they all have this option. If you didn't enable encryption when installing your system, you can encrypt your home folder or partition after the fact using ecrypt-utils, a command line utility. ENCRYPTION TUTORIAL: 🤍 KDE has something called Plasma Vaults, that lets you create encrypted folders with a nice graphical interface, with the ability to set different passwords for each folder. You probably also have an anti virus, your best option will be ClamAV (and ClamTK, it's graphical interface). it detects trojans, viruses, malware and the like, it's open source, and it's completely free of charge. But if you want to restrict permissions for Flatpak apps, then you need Flatseal. It's an application that will list all your flatpak apps and let you grant, or remove permissions to them. If you want the benefits of a sandbox but without using Flatpak apps, you can also run any app installed from a regular package or an AppImage in a sandbox, using Firejail, and Firetools, its graphical interface. If what you want is to make sure that the apps or services you run don't do anything weird with your internet connection, then there's Safing's Portmaster. It's open source, free of charge, and it lets you monitor every network request every part of your system makes, and restrict them as you see fit. Oh, and it also has a system wide ad and tracker blocker. VPNs are a tool you can use to be more private online. I don't have any specific recommendations, but you can check the link I left in the description to TechLore's VPN chart to find one that is suitably private: 🤍 If you regularly use public computers, or someone else's, you might want to use TAILS, a live USB, but with persistent storage that is encrypted. Your web browser will also be a big part of how private you are on the internet. If you prefer to stick to Chrome's rendering engine, then something like Brave will be way less intrusive and well configured by default, and if you don't want to encourage Google's monopoly on the internet, then Firefox is also very private, once you disable the opt-out telemetry in the Privacy and Security settings. You also have LibreWolf, which is Firefox without the telemetry and with privacy focused search engines out of the box. Speaking of which, your search engine is also something you should look at for privacy. Google or Bing are just NOT what you want for that. I personally use Ecosia as my default search engine. When Ecosia falls short, I use startpage, which is basically Google's results, but with complete anonymization of all queries, so Google doesn't know who or from where the query has been made. VIDEO ON SEARCH ENGINES: 🤍 Bleachbit will let you delete cache files, cookies, internet history, temporary files, logs and more. If you want to just completely delete any single file, then there's GNOME File Shredder. If you need to share certain images but hide some information on it, blurring it with a gaussian blur isn't enough, as it's now relatively easy to deblur an image. Obfuscate is a simple tool that lets you hide information.

How To Protect Your Linux Server From Hackers!

281987
14344
1025
00:20:38
15.04.2021

Do you have a linux server and do you know how to prevent getting hacked? In this video we will critically discuss a few best practices. The video can be summarized as: "a lot of fluff, not much use". Prefer to read? Blog article version: 🤍 Very scientific analysis: 🤍 Other Opinions: - Enable unattended updates: 🤍 Chapters: 00:00 - Intro and Motivation 01:47 - 1. Disable SSH Password Login 03:47 - Detour: Password Login for Websites (https) 04:39 - Password Recommendations 05:33 - 2. Disable Direct root SSH Login 07:07 - Creating user and add to sudo 08:47 - 3. Change Default SSH Port 10:42 - 4. Disable IPv6 for SSH 13:40 - 5. Setup a Basic Firewall 15:43 - 6. Unattended Server Auto Upgrade 19:04 - Conclusion -=[ 🐕 Social ]=- → Twitter: 🤍 → Website: 🤍 → Subreddit: 🤍 → Facebook: 🤍 -=[ 📄 P.S. ]=- All links with "*" are affiliate links.

The Biggest Linux Security Mistakes

111573
4851
259
00:09:44
03.08.2022

Security is a journey, not a destination So after making a couple videos showing how to increase performance in desktop computers running Linux, I was overwhelmed by the sheer scale of comments worried about mitigations. If you are worried about that, you should be even more worried about the things below. Website Guide: 🤍 Support My Work - ►► Get Updates, Launch Announcements and More ➜ 🤍 ►► Chris Titus Tech Digital Downloads ➜ 🤍 ►► Product and Service Recommendations ➜ 🤍 ►► My YouTube Gear and Computers ➜ 🤍 Other Places to Find Me - ►► Titus Tech Talk ➜ 🤍 ►► Titus Tech Gaming ➜ 🤍 ►► Chris Titus Fitness ➜ 🤍 ►► Twitch ➜ 🤍 ►► Twitter ➜ 🤍 DISCLAIMER: This video and description contain affiliate links, which means that if you click on one of the product links, I’ll receive a small commission. This helps supports the channel and allows us to continue to make videos like this. Thank you for your support!

Why is GNU/Linux the Most Secure Desktop Operating System?

168996
8659
673
00:10:02
19.06.2020

In this video I discuss some of the reasons why GNU/Linux is a more secure desktop operating system that Microsoft Windows and Apples Mac OS. Some of the reasons I give in the video are Better ways of download software from a software repository, instead of having to go to google to look up software to download and hope that Google actually redirects you to the right place file permissions on Linux The fact that Linux users are typically more tech savy than Windows users And the security that is provided by the linux kernel which is far more secure than the windows kernel. Subscribe to my YouTube channel 🤍 and be sure to click that notification bell so you know when new videos are released. ₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿ Bitcoin 3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV Ethereum 0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079 Litecoin MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF Dash Xh9PXPEy5RoLJgFDGYCDjrbXdjshMaYerz Zcash t1aWtU5SBpxuUWBSwDKy4gTkT2T1ZwtFvrr Chainlink 0x0f7f21D267d2C9dbae17fd8c20012eFEA3678F14 Bitcoin Cash qz2st00dtu9e79zrq5wshsgaxsjw299n7c69th8ryp Etherum Classic 0xeA641e59913960f578ad39A6B4d02051A5556BfC USD Coin 0x0B045f743A693b225630862a3464B52fefE79FdB

10 Tips for Hardening your Linux Servers

52826
1837
63
00:22:48
21.04.2021

For the first episode in my Enterprise Linux Security series, I go over 10 tips for hardening your Linux servers. This video includes some important suggestions to take into consideration for your infrastructure, that will serve as a foundation for future episodes. As the series continues, we'll explore more concepts in-depth. # LearnLinuxTV Links 🐧 Main site: ➡️ 🤍 🐧 LearnLinuxTV Community: ➡️ 🤍 # Support LearnLinuxTV (commission earned) 📖 Check out Jay's latest book, Mastering Ubuntu Server 4th Edition. Covers Ubuntu 22.04! ➡️ 🤍 🙌 Support me on Patreon and get early access to new content! ➡️ 🤍 ☁️ Check out KernelCare Enterpise and patch your servers in real-time: ➡️ 🤍 ☁️ Support LearnLinuxTV and Set up your own cloud server with Akamai Connected Cloud: ➡️ 🤍 🛒 Affiliate store for Linux compatible hardware/accessories (commission earned): ➡️ 🤍 💻 Check out the Tiny Pilot KVM for your Homelab (commission earned): ➡️ 🤍 # About Me 🐦 Follow me on Twitter! ➡️ 🤍 👨 More about me: ➡️ 🤍 ➡️ 🤍 # Recommended evergreen videos: 💽 How to create a bootable flash drive for installing Linux ➡️ 🤍 🐧 OpenSSH Guide ➡️ 🤍 📖 LVM Deep-dive: ➡️ 🤍 🔐 How to better secure OpenSSH: ➡️ 🤍 ☁️ How to create a cloud Linux server with Linode: ➡️ 🤍 *FAQ* 🐧 Which distro do I use? ➡️ 🤍 💽 My recording gear (commissions earned): ➡️ 🤍 #Server #Linux #Security

AMA: Windows Subsystem for Linux (WSL)

477
8
0
00:30:18
30.11.2023

Do you want to run Linux apps and tools on your Windows machine? Do you want to learn about the latest features and updates in WSL? Watch on for this Ask Microsoft Anything (AMA) session where we answer the audience's queries and share our tips and tricks for using WSL. See the Q&A: 🤍 This session is part of the Microsoft Technical Takeoff for Windows and Intune. Visit 🤍 to see the full agenda of AMAs and deep dives!

Security and Linux

8693
494
66
00:05:10
05.06.2023

Linux is NOT secure by default!

How to protect Linux from Hackers // My server security strategy!

185619
5708
222
00:30:39
17.08.2021

How To Protect Linux From Hackers, Malware, and other bad things that could infect your server! I'll show you my server security strategy that might help you as well when you're running a Linux Server and hosting containerized applications. #Linux #Cybersecurity #HomeLab How to use a VPN: 🤍 Use a Reverse Proxy: 🤍 Update Docker with Watchtower: 🤍 Tailscale VPN: 🤍 Get started with Docker: 🤍 Teleport-*: 🤍 Follow me: TWITTER: 🤍 INSTAGRAM: 🤍 DISCORD: 🤍 GITHUB: 🤍 PATREON: 🤍 MY EQUIPMENT: 🤍 Timestamps: 00:00 - Introduction 00:43 - Plan your own security strategy! 02:03 - Update your software 04:28 - Don't forget your Docker containers 06:18 - Secure your SSH Access 13:24 - Use 2FA and an Access Proxy 15:48 - Don't expose unused services 17:36 - Use a firewall 21:21 - Use a reverse proxy when possible 23:12 - Use VPNs, DMZs, and access gateways 24:59 - Use an IPS (Intrusion Prevention System) 27:37 - Isolate Applications with Docker All links with "*" are affiliate links.

Vanilla OS: New, highly secure, immutable Linux distro

226966
10864
835
00:18:49
16.04.2023

Vanilla OS installation and demo, including an explanation of what is meant by an immutable operating system, and how this is implemented in Vanilla OS to improve stability and security. Vanilla OS can be freely downloaded from: 🤍 You can find a detailed explanation of abroot here: 🤍 In the video, I mention Windows CE, which I made a video about here: 🤍 I also mentioned some other immutable Linux distros, which were: Bottlerocket: 🤍 Talos Linux: 🤍 and Fedora Siverblue: 🤍 Finally, my recent Blender tutorials are here: 🤍 🤍 For additional ExplainingComputers videos and other content, you can become a channel member here: 🤍 More videos on computing and related topics can be found at: 🤍 You may also like my ExplainingTheFuture channel at: 🤍 Chapters: 00:00 Introduction 00:51 Secure & Stable (what is an immutable OS?) 04:32 Bare Metal Test (installation) 07:59 Vanilla GNOME 13:13 Installing Apps 17:46 A Daily Driver? #VanillaOS #ImmutableOS #Linux #explainingcomputers

6 Steps to Secure Your Linux Server From Hackers

4912
261
6
00:00:42
21.02.2023

Protect your Linux server from hackers with these 6 tips. ⭐ Get my full-stack Next.js with Express & TypeScript course: 🤍 ✅ Get my free React Best Practices course: 🤍 💌 Join my newsletter for regular web dev tips: 🤍 💬 Join our developer community on Discord: 🤍 📣 Follow Coding in Flow on social media: Twitter: 🤍 Instagram: 🤍 TikTok: 🤍 Facebook: 🤍

Most Secure, Private and Usable Linux Distro

172232
6016
402
00:12:57
04.12.2019

Discussing the different Linux distros that are focused on security and privacy but can be used as a daily driver. Which ones are the best and the most usable? What are the problems affecting their usability and how to fix that? I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to educate. You are losing your Internet privacy and Internet security every day if you don't fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email. I like alternative communication technology like Amateur Radio and data communications using Analog. I'm a licensed HAM operator. Contact Rob on the Brax.Me App (🤍robbraxman) for encrypted conversations (open source platform) 🤍 Premium VPN with Cloud-Based TOR Routing 🤍 Cybersecurity Reference 🤍 Privacy Focused Social Media - Open Source - Encrypted Communications 🤍 Store for BytzVPN, BraxWifi Router, and merchandise

LINUX SECURITY | Top 5 Tips Tested & Recommended

14775
473
14
00:07:10
20.08.2021

🧨 Protect your Linux PC NOW | Get a discount 🧨 ✅ ESET - we have a DEAL ➡️ 🤍 5 tips for Linux you can take to secure your machine: 1️⃣ User Management One of our top tips is to create a separate, non-root user for your desktop environment, using sudo, an administrative privilege command. This is especially important if you're using your machine to access the wide-web. And logging in as root is something you really don’t want to be doing! 2️⃣ Full disk encryption Encrypting your entire operating system is hugely beneficial. Say you lost your laptop...you’ve put a passcode on it, so no need to sweat, everything should be fine, right? Wrong! A cybercriminal can boot into Linux using a USB key. This means they could read every piece of your data without even needing your password. To avoid this happening to your PC, all you’ve got to do is safeguard your data by encrypting your entire hard disk. That way, a cybercriminal couldn’t read anything, without your FDE password. 3️⃣Use Linux firewall Linux kernel includes a firewall component called 'iptables', or on some Linux releases it’s been replaced by 'nftables'. This is by far a very powerful way to control network traffic, and even safeguard your PC from various attacks. On Ubuntu there is a frontend program that simplifies iptables, called UFW, which means ‘Uncomplicated Firewall.’ 4️⃣Keep your browser secure So many standard browsers out there leave you susceptible to all kinds of attacks, so it’s better to think one step ahead. Some of the top, free, browser extensions I recommend to do the job are: NoScript, which is a great way to enable and disable JavaScript per-site you visit, or even domain. A few more are HTTPS-Everywhere, which is thankfully compatible with Brave and Tor browser. Finally, Ghostery browser extension. These will all help you block ads, and even trackers. Safeguarding your machine, and your privacy a little more. 5️⃣ A reliable antivirus Whilst Malware for linux might be rare, it does still exist and assuming it won’t happen to you, might be just what gets your Linux PC compromised. It may be Open source, and have certain security practises, but no software or operating system is 100% bullet-proof. That’s why one of our top recommendations to protect your PC is a reliable antivirus software for Linux. Linux OS is commonplace for servers or enterprises, that’s why a lot of antivirus solutions out there focus on non-consumer scenarios. If you are looking for options I have a couple suggestions: ESET first and foremost. If you’re a Linux user, the ESET NOD32 Essential Protection gives you the same security features as the more expensive plans. This antivirus for Linux gives you the ability to keep your computer optimized, with a small system footprint. ✅ ESET - we have a DEAL ➡️ 🤍 ClamAV is one for the books, also. This software will scan for every type of malware, and it can be done from the settings. Though it’s a non-commercial option, so keep that in mind. 00:00 Intro 01:04 Tip for Linux #1 - user management 02:57 Tip for Linux #2 - full disk encryption 04:00 Tip for Linux #3 - Linux firewall 04:43 Tip for Linux #4 - keep your browser secure 05:48 Tip for Linux #5 - a reliable antivirus 06:50 Final thoughts A couple of notes from our side: - ClamAV works through command line only, the recording is of ClamTK, a version of ClamAV, with a UI (ClamAV doesn’t have one) - The consumer option of ESET will be discontinued next year, and only the enterprise edition will be available. Affiliation disclaimer: “We are affiliated but not sponsored by any service provider. This means we may receive a small commission when you click on the provided links, but keep our reviews to be legit.” → Latest news 🤍 → Facebook 🤍 → Twitter 🤍 Footage provided by Storyblocks #CyberNews #CyberNewsReview

Linux Malware and Securing Your System

83258
3479
239
00:13:59
19.08.2020

Linux Malware and Securing Your System is something every Linux user should be familiar with. In this video, I go over threats and how to protect against them. Timestamps: 00:00 Introduction 00:53 FBI NSA Document 01:59 What is Drovorub 03:17 Preventive Measures 04:35 Check Kernel Module Signatures 05:35 Secure Boot 06:49 Secure Linux GitHub Project 12:49 Conclusion ┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅ Cheatsheet: 🤍 Support My Work - - Chris Titus Tech Digital Downloads ➜ 🤍 - Product and Service Recommendations ➜ 🤍 - My YouTube Gear and Computers ➜ 🤍 Other Places to Find Me - - Titus Tech Talk ➜ 🤍 - Chris Titus Crypto ➜ 🤍 - Twitch ➜ 🤍 - Twitter ➜ 🤍

Linux Security | Is Linux really that secure?

7147
212
31
00:08:03
03.09.2022

Today in this video, I am going to talk about Linux security, that is how Linux help keep your system secure . This video is related to cyber security and a brief basics on how security works on Linux. Watch the video till the end. Like, share and subscribe. Thank you so much guys. More awesome contents coming soon! –––––––––––––––––––––––––––––– Track: Seaside — Thomas Gresen [Audio Library Release] Music provided by Audio Library Plus Watch: 🤍 Free Download / Stream: 🤍 –––––––––––––––––––––––––––––– –––––––––––––––––––––––––––––– Track: Now or Never — tubebackr [Audio Library Release] Music provided by Audio Library Plus Watch: 🤍 Free Download / Stream: 🤍 –––––––––––––––––––––––––––––– –––––––––––––––––––––––––––––– Track: Cheers — WOMA [Audio Library Release] Music provided by Audio Library Plus Watch: 🤍 Free Download / Stream: 🤍 –––––––––––––––––––––––––––––– –––––––––––––––––––––––––––––– Track: Sunset With You — Nico Anuch [Audio Library Release] Music provided by Audio Library Plus Watch: 🤍 Free Download / Stream: 🤍 –––––––––––––––––––––––––––––– Follow me on Instagram - 🤍 Become an Arcnation member 🌟✨ Support me on Patreon - 🤍 Access unreleased content or view videos long before they are published. Your donations will be used for making my videos better. I will be really grateful. I will use the received donation for making my videos better, to buy lights for my setup, to design my room accordingly, to buy a camera, video editing software, animating software, and more.

Top 5 PRIVACY Focused Linux Distros in 2023

5463
58
6
00:06:23
08.01.2023

It is true that Linux is generally considered to be more secure than other operating systems, especially when it comes to protecting against viruses and other types of malware. This is due in part to the way that Linux is designed, as well as the fact that it has a smaller user base and therefore is not as much of a target for malicious attacks. However, no operating system is completely immune to security threats. It is important to follow best practices and take steps to protect yourself online no matter which operating system you use. There are also some Linux distributions that are specifically designed with security in mind and include additional tools and features to help users protect their privacy and stay safe online. #linux #linuxdistro #privacy #top5 #tails #kalilinux #kali #whonix #privacyfoused #cybersecurity #security #parrotos

Linux Security - UFW Complete Guide (Uncomplicated Firewall)

92592
2656
98
00:27:51
05.10.2020

In this video series, we will be taking a look at how to set up, secure, and audit Linux servers. This video will explain and demonstrate how to set up and configure UFW and various firewall rules. Register for part 2 of the Linux Server Security Series: 🤍 Get $100 in free credits on Linode: 🤍 Our videos are also available on the decentralized platform LBRY: 🤍 SUPPORT US: Patreon: 🤍 Merchandise: 🤍 SOCIAL NETWORKS: Twitter: 🤍 LinkedIn: 🤍 WHERE YOU CAN FIND US ONLINE: HackerSploit - Cybersecurity Training Simplified: 🤍 HackerSploit Forum: 🤍 HackerSploit Academy: 🤍y LISTEN TO THE CYBERTALK PODCAST: Spotify: 🤍 We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms. Thanks for watching! Благодарю за просмотр! Kiitos katsomisesta Danke fürs Zuschauen! 感谢您观看 Merci d'avoir regardé Obrigado por assistir دیکھنے کے لیے شکریہ देखने के लिए धन्यवाद Grazie per la visione Gracias por ver شكرا للمشاهدة #Linux#Security#Cybersecurity

Top 3 BEST Anonymous Operating Systems

41391
1574
91
00:08:44
11.06.2023

These three operating systems are some of the safest operating systems designed to protect your privacy, security, and anonymity - all of which can be routed through Tor! 🔐 Our Website: 🤍 🕵 Go Incognito Course - to learn about privacy: 🤍 🏫 Techlore Coaching - to get direct support: 🤍 💻 Techlore Forum - to connect with other advocates: 🤍 🦣 Mastodon - to stay updated: 🤍 We cannot provide our content without our Patrons, huge thanks to: Afonso, Boori, BRIGHTSIDE, Casper, Clark, Cyclops, Eldarix, JohnnyO, Jon, kevin, Larry, love your content, NotSure, Poaclu, x 🧡 Join them on Patreon: 🤍 💚 To see our production gear, privacy tools we use, and other affiliates: 🤍 💖 All Techlore Support Methods: 🤍 Resources: 🤍 🤍 🤍 00:00 Introduction 00:12 TailsOS 02:28 Whonix 03:46 Honorable Mentions 05:03 QubesOS #techlore #anonymous #privacy

5 Easy Tweaks to increase your Linux Server's Security

20136
940
39
00:40:05
05.05.2021

In the second episode of my Enterprise Linux Security series, I'll show you 5 easy tweaks you can make to enhance the security of your Linux server. Ubuntu Server will be shown as the example distribution, but most of these tweaks can be done on any distro with some modifications to the syntax as necessary. Time Codes: 00:00 - Intro 03:27 - Tweak 1: Adding a non-root user 08:06 - Tweak 2: Install updates 10:47 - Tweak 3: Setting up unattended-upgrades 20:31 - Tweak 4: Locking down Openssh 32:26 - Tweak 5: Installing Fail2ban # LearnLinuxTV Links 🐧 Main site: ➡️ 🤍 🐧 LearnLinuxTV Community: ➡️ 🤍 # Support LearnLinuxTV (commission earned) 📖 Check out Jay's latest book, Mastering Ubuntu Server 4th Edition. Covers Ubuntu 22.04! ➡️ 🤍 ☁️ Support LearnLinuxTV and Set up your own cloud server with Akamai Connected Cloud: ➡️ 🤍 🙌 Support me on Patreon and get early access to new content! ➡️ 🤍 ☁️ Check out Extended Lifecycle Support to keep your end-of-life distributions supported for a longer period of time: ➡️ 🤍 🛒 Affiliate store for Linux compatible hardware/accessories (commission earned): ➡️ 🤍 💻 Check out the Tiny Pilot KVM for your Homelab (commission earned): ➡️ 🤍 # About Me 🐦 Follow me on Twitter! ➡️ 🤍 👨 More about me: ➡️ 🤍 ➡️ 🤍 # Recommended evergreen videos: 💽 How to create a bootable flash drive for installing Linux ➡️ 🤍 🐧 OpenSSH Guide ➡️ 🤍 📖 LVM Deep-dive: ➡️ 🤍 🔐 How to better secure OpenSSH: ➡️ 🤍 ☁️ How to create a cloud Linux server with Linode: ➡️ 🤍 *FAQ* 🐧 Which distro do I use? ➡️ 🤍 💽 My recording gear (commissions earned): ➡️ 🤍 #Server #Linux #Security

SSH Key Linux secure remote authentication to your Server

17989
557
63
00:18:13
29.06.2020

SSH Key Linux and how to establish a remote connection from any client. I will also explain how to authenticate via private and public keys in a secure and easy way. Follow me: TWITTER: 🤍 INSTAGRAM: 🤍 DISCORD: 🤍 GITHUB: 🤍 PATREON: 🤍 MY EQUIPMENT: 🤍 Timestamps: 00:00 Introduction 01:14 Install OpenSSH Server on Linux (Ubuntu) 03:32 Connect with an SSH Client 05:52 Copy files with SSH 08:28 Authenticate with private and public keys 14:58 What about security and connect from public internet? All links with "*" are affiliate links.

How Linux Respects Your Privacy (And How Windows Does NOT!)

32022
2218
455
00:10:33
30.08.2022

I often claim that Linux is better for privacy than proprietary operating systems like Windows, Mac, ChromeOS, Android, iOS, etc. Usually, I talk about the things that are hidden from view, like the spyware and keyloggers that Windows secretly uses. Today though, I'm going to talk about easy-to-see, tangible benefits of using Linux if you are concerned about privacy. WANT TO SUPPORT THE CHANNEL? 💰 Patreon: 🤍 💳 Paypal: 🤍 🛍️ Amazon: 🤍 👕 Teespring: 🤍 DONATE CRYPTO: 💰 Bitcoin: 1Mp6ebz5bNcjNFW7XWHVht36SkiLoxPKoX 🐶 Dogecoin: D5fpRD1JRoBFPDXSBocRTp8W9uKzfwLFAu 📕 LBC: bMfA2c3zmcLxPCpyPcrykLvMhZ7A5mQuhJ DT ON THE WEB: 🕸️ Website: 🤍 📁 GitLab: 🤍 🗨️ Mastodon: 🤍 👫 Reddit: 🤍 📽️ LBRY/Odysee: 🤍 FREE AND OPEN SOURCE SOFTWARE THAT I USE: 🌐 Brave Browser - 🤍 📽️ Open Broadcaster Software: 🤍 🎬 Kdenlive: 🤍 🎨 GIMP: 🤍 🎵 Tenacity: 🤍 💻 VirtualBox: 🤍 🗒️ Doom Emacs: 🤍 Your support is very much appreciated. Thanks, guys!

Hardening Access to Your Server | Linux Security Tutorial

144825
1945
83
00:18:49
11.11.2020

In this tutorial, we'll go over how to harden your Linux server against unauthorized access. With these basic security practices in place, your server will be more secure from outside attacks. Chapters: 0:00 - Intro 0:41 - Updating Your System 4:34 - Using Automatic Updates 6:20 - Add a Limited User Account 10:22 - Harden SSH Access 16:12 - Remove Unused Ports 17:57 - Outro New to Cloud Computing? Get started here with a $100 credit → 🤍 Read the doc for more information on Securing Your Server→ 🤍 Learn more about Security→ 🤍 Subscribe to get notified of new episodes as they come out → 🤍 #Security #Linode #ServerSecurity #Linux Product: Linode, Server Security, Linux; Jay LaCroix;

Whonix KVM - A Secure OS for the Dark Web

146795
6326
441
00:21:22
07.07.2022

In this video I show you how to setup Whonix KVM, I also explain why its better to use Whonix in KVM instead of virtualbox due to Oracles bad track record of fixing and giving details about security issues. Download Whonix KVM 🤍 ₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿ Monero 45F2bNHVcRzXVBsvZ5giyvKGAgm6LFhMsjUUVPTEtdgJJ5SNyxzSNUmFSBR5qCCWLpjiUjYMkmZoX9b3cChNjvxR7kvh436 Bitcoin 3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV Ethereum 0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079 Litecoin MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF Dash Xh9PXPEy5RoLJgFDGYCDjrbXdjshMaYerz Zcash t1aWtU5SBpxuUWBSwDKy4gTkT2T1ZwtFvrr Chainlink 0x0f7f21D267d2C9dbae17fd8c20012eFEA3678F14 Bitcoin Cash qz2st00dtu9e79zrq5wshsgaxsjw299n7c69th8ryp Etherum Classic 0xeA641e59913960f578ad39A6B4d02051A5556BfC USD Coin 0x0B045f743A693b225630862a3464B52fefE79FdB Subscribe to my YouTube channel 🤍 and be sure to click that notification bell so you know when new videos are released.

Linux Security - SSH Security Essentials

91663
3236
186
00:25:06
01.10.2020

In this video series, we will be taking a look at how to set up, secure, and audit Linux servers. This video covers the essentials of securing SSH. 0:00 Introduction to the series 2:14 Video starts Register for part 2 of the Linux Server Security Series: 🤍 Get $100 in free credits on Linode: 🤍 Our videos are also available on the decentralized platform LBRY: 🤍 SUPPORT US: Patreon: 🤍 Merchandise: 🤍 SOCIAL NETWORKS: Twitter: 🤍 LinkedIn: 🤍 WHERE YOU CAN FIND US ONLINE: HackerSploit - Cybersecurity Training Simplified: 🤍 HackerSploit Forum: 🤍 HackerSploit Academy: 🤍y LISTEN TO THE CYBERTALK PODCAST: Spotify: 🤍 We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms. Thanks for watching! Благодарю за просмотр! Kiitos katsomisesta Danke fürs Zuschauen! 感谢您观看 Merci d'avoir regardé Obrigado por assistir دیکھنے کے لیے شکریہ देखने के लिए धन्यवाद Grazie per la visione Gracias por ver شكرا للمشاهدة #Linux#Security#Cybersecurity

Five Things Linux Does Better Than Windows

684050
36143
3781
00:06:27
18.02.2022

Get 50% off your Zoho CRM annual subscription with code ZCRM50 at: 🤍 Does Linux best Windows in enough areas to merit serious consideration as your desktop operating system? Leave a reply with your requests for future episodes, or tweet them here: 🤍 ► GET MERCH: 🤍 ► AFFILIATES, SPONSORS & REFERRALS: 🤍 ► PODCAST GEAR: 🤍 ► SUPPORT US ON FLOATPLANE: 🤍 FOLLOW US ELSEWHERE - Twitter: 🤍 Facebook: 🤍 Instagram: 🤍 TikTok: 🤍 Twitch: 🤍

Most Secure Linux Distros For Advanced Privacy Oriented & Security Concern Users For 2022 | 🐧10 BEST

14320
140
1
00:11:47
12.11.2021

In This Video We Are Discussing About It is always a concern of users to surf the internet in privacy. However, surfing on the usual operating systems can’t provide the security you want. There’s no need to worry, Linux is among the most private operating systems available. So in this video, we will list the best Linux Distros for Privacy. Best Linux Distros for Privacy – 2022 The below list is completely based on the user reviews, features, security, privacy, and accessibility of these Linux distros. ► Subscribe me here : 🤍 ► Follow me on Tumblr : 🤍 ► Follow me on Twitter : 🤍 ► Follow me on Pinterest : 🤍 Most Secure Linux Distros For Advanced Privacy Oriented & Security Concern Users For 2022 | 🐧10 BEST Click Here to Watch More Entertainment : ► Linux Videos : 🤍 ► Buyer Guide Videos : 🤍 ► Raspberry pi Videos : 🤍 ► Review Videos : 🤍 ► Mozilla Videos : 🤍 ► Vpn Videos : 🤍 ► Ipad Videos : 🤍 ► Mac Os Videos : 🤍 ——Subscribe to stay up to date with the channel! —— Make sure to subscribe to the channel & select the 🔔bell push notifications (click the 🔔BELL icon next to the subscribe button) to be notified immediately when I release a new video. ✅ BE SURE TO LIKE, SUBSCRIBE, AND TURN ON NOTIFICATIONS!!! If you watched this video and scrolled to the bottom and are reading this I would love to hear from you. If you have any questions give me a shout on social media & I'll try and answer all the questions you might have. Thanks for watching and I’ll see you next time! 1. Qubes OS Qubes OS is a single-user operating system based on open-source, independent software. Providing security through isolation is one of the main objectives of Qubes OS (security-focused desktop operating system). 2. Tails – Incognito Linux system The Amnesic Incognito Live System, i.e., Tails, is a type of operating system that protects our system from censorship and surveillance. Tails is a security-focused Debian-based Linux distribution whose primary purpose is to maintain anonymity and privacy. Through Tor, we can block any non-anonymous connection and force all its outgoing and incoming connections to go. This operating system is designed to work as a Live USB or Live DVD. No digital footprint will be left on the machine unless explicitly asked to leave a footprint. 3. Whonix Linux for Security Whonix is ​​software designed to create anonymity and privacy by helping users run applications anonymously. You can run Whonix on the Debian Linux system, which uses two virtual machines such as the Tor “gateway” and the “Workstation.” It is currently working on a unified desktop environment. Whonix sincerely appreciates contributions and donations to support the project’s ongoing efforts and encourages users to provide feedback on their experiences. 4. Kali Linux Kali Linux has a wide range of utilities and tools for penetration testing. Security researchers, ethical hackers, and pentesters around the world rely on this distro for its many tools. From information gathering to final reporting, Kali Linux allows IT professionals and security professionals to assess the security of their systems. This distro is named after the Hindu goddess “Kali”. Users can run it on ARM devices like Raspberry Pi. Kali Linux’s training suite is available on its website under the name Dojo. 4. Kali Linux Kali Linux has a wide range of utilities and tools for penetration testing. Security researchers, ethical hackers, and pentesters around the world rely on this distro for its many tools. From information gathering to final reporting, Kali Linux allows IT professionals and security professionals to assess the security of their systems. This distro is named after the Hindu goddess “Kali”. Users can run it on ARM devices like Raspberry Pi. Kali Linux’s training suite is available on its website under the name Dojo. 6. BlackArch Linux- Security Testing 7. Parrot OS – for Security experts 8. Discreete Linux 9. Alpine Linux 10. PureOS for Privacy #Linux #LinuxDistros #Privacy #Security #Anonymous Todays Video - 10 Best Linux Distros for Privacy and Security for 2022!

LINUX FIX: apt-get update: E: updating from such a repository can't be done securely and is disabled

37696
283
44
00:01:51
16.08.2021

Have you ever gotten the error - "updating from such a repository can't be done securely and is therefore disabled by default"? Well, thankfully this is very easy to fix and all we have to do is add a couple of text to /etc/apt/sources.list Applies to Debian-based linux distributions. (Ubuntu/Kali/Linux Mint) #linuxtutorialvideos #ubuntututorialvideos #ubuntulearningtutorial #centostutorialvideos #centosadministrationtutorial #learninghowtoprogramgames #learningunityprogramming #simplecodingtutorial #easycodingtutorials #veryeasycodingtutorials #unityeasygametutorial

Linux Security - Securing Apache2

53406
1760
60
00:23:43
03.10.2020

In this video series, we will be taking a look at how to set up, secure, and audit Linux servers. This video will explain the process of securing Apache2. Register for part 2 of the Linux Server Security Series: 🤍 Get $100 in free credits on Linode: 🤍 Our videos are also available on the decentralized platform LBRY: 🤍 SUPPORT US: Patreon: 🤍 Merchandise: 🤍 SOCIAL NETWORKS: Twitter: 🤍 LinkedIn: 🤍 WHERE YOU CAN FIND US ONLINE: HackerSploit - Cybersecurity Training Simplified: 🤍 HackerSploit Forum: 🤍 HackerSploit Academy: 🤍y LISTEN TO THE CYBERTALK PODCAST: Spotify: 🤍 We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms. Thanks for watching! Благодарю за просмотр! Kiitos katsomisesta Danke fürs Zuschauen! 感谢您观看 Merci d'avoir regardé Obrigado por assistir دیکھنے کے لیے شکریہ देखने के लिए धन्यवाद Grazie per la visione Gracias por ver شكرا للمشاهدة #Linux#Security#Cybersecurity

Should You Run Anti-Virus On Linux?

67887
2973
343
00:09:26
22.09.2022

For many years, the Linux community has claimed that running anti-virus programs is not necessary on Linux. But as Linux gains more popularity, and as more viruses start targeting Linux, is it time that we reconsider the need for AV on Linux? WANT TO SUPPORT THE CHANNEL? 💰 Patreon: 🤍 💳 Paypal: 🤍 🛍️ Amazon: 🤍 👕 Teespring: 🤍 DONATE CRYPTO: 💰 Bitcoin: 1Mp6ebz5bNcjNFW7XWHVht36SkiLoxPKoX 🐶 Dogecoin: D5fpRD1JRoBFPDXSBocRTp8W9uKzfwLFAu 📕 LBC: bMfA2c3zmcLxPCpyPcrykLvMhZ7A5mQuhJ DT ON THE WEB: 🕸️ Website: 🤍 📁 GitLab: 🤍 🗨️ Mastodon: 🤍 👫 Reddit: 🤍 📽️ LBRY/Odysee: 🤍 FREE AND OPEN SOURCE SOFTWARE THAT I USE: 🌐 Brave Browser - 🤍 📽️ Open Broadcaster Software: 🤍 🎬 Kdenlive: 🤍 🎨 GIMP: 🤍 🎵 Tenacity: 🤍 💻 VirtualBox: 🤍 🗒️ Doom Emacs: 🤍 Your support is very much appreciated. Thanks, guys!

DFS101: 2.4 How to secure a Linux computer

6021
102
2
00:12:47
28.09.2020

Get started digital forensic science! Digital forensic science lets us recover data and investigate digital devices. In this video, we describe some basic actions you can take to secure a Linux computer. These actions are general first-steps in your security but are a quick and easy way to make your computer more secure. 🚀 Full Digital Forensic Courses → 🤍e 010001000100011001010011011000110110100101100101011011100110001101100101 Get more Digital Forensic Science 👍 Subscribe → 🤍 ❤️ YT Member → 🤍 ❤️ Patreon → 🤍 🕸️ Blog → 🤍e 🤖 Code → 🤍 🐦 Follow → 🤍 📰 DFIR Newsletter → 🤍 010100110111010101100010011100110110001101110010011010010110001001100101 Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. Please link back to the original video. If you want to use this video for commercial purposes, please contact us first. We would love to see what you are doing.

Why is Linux So Secure? | File Permissions and Groups

9572
819
61
00:35:48
17.05.2023

Linux is the most secure OS you can run on your computer... Here's why: "Permissions" File attributes that define who can access or change a file and whether a file can be executed as a program. "-rwxr-xr-x" Shows file type and permissions. +-++-+ | d- | File Type | +-++-+ | - = regular file | | d = directory | | l = link | +-++-+ | Permission | Octal| Field | +-++-+ | -rwx | 700 | User | | rwx- | 070 | Group | | -rwx | 007 | Other | +-++-+ Octal values: Read = 4 Write = 2 Execute = 1 8 bits = 1 byte. Uses digits 0 1 2 3 4 5 6 7. You can set permissions in the file manager or with the commend "chmod." Examples: Set a file to be executable and readable by by everyone but only writable by you: 'chmod 755 filemane' Set execute bit without changing other permisions: 'chomd +x filename' When applying permissions to directories on Linux, the permission bits have different meanings than on regular files. The write bit allows the affected user to create, rename, or delete files within the directory, and modify the directory's attributes. The read bit allows the affected user to list the files within the directory. The execute bit allows the affected user to enter the directory and access files and directories inside.

The Basics of Computing Security: Linux & SQL | Google Cybersecurity Certificate

78203
1718
56
01:54:38
10.05.2023

This is the fourth course in the Google Cybersecurity Certificate. In this course, you will explore computing skills that you’ll use on the job as a cybersecurity analyst. First, you'll practice using Linux, an operating system commonly used by cybersecurity professionals. For example, you'll use the Linux command line through the Bash shell to navigate and manage the file system and authenticate users. Then, you'll use SQL to communicate with a database. Take the Certificate HERE: 🤍 Get started with the course - 00:00:00 The wonderful world of operating systems - 00:02:04 The operating system at work - 00:05:52 The user interface - 00:11:12 Review: Introduction to operating systems - 00:15:17 All about Linux - 00:16:23 Linux distributions - 00:23:52 The shell - 00:29:00 Review: The Linux operating system - 00:33:39 Navigate the Linux file system - 00:34:28 Manage file content in Bash - 00:43:29 Authenticate and authorize users - 00:55:37 Get help in Linux - 01:12:39 Review: Linux commands in the Bash shell - 01:16:31 Introduction to SQL and Databases - 01:17:26 SQL queries - 01:25:22 More SQL filters - 01:33:26 SQL joins - 01:43:16 Review: Databases and SQL - 01:51:42 Congratulations on completing Course 4! - 01:52:57 Subscribe HERE: 🤍 #GoogleCareerCertificates #Cybersecurity #CareerGrowth About Google Career Certificates: Google Career Certificates are lessons designed to prepare you for entry-level roles in career fields like cybersecurity, data analytics, digital marketing & e-commerce, IT support, project management, or user experience (UX) design. Google Career Certificates give learners the skills they need to apply for more than 2.4 million in-demand jobs with a median salary of $76,000+. Google Career Certificates 🤍 The Basics of Computing Security: Linux & SQL | Google Cybersecurity Certificate 🤍

10 Things I Wish I Knew When I First Started With Linux

224678
7396
387
00:23:31
30.03.2023

Working with Linux servers is a fun and rewarding career. But for those getting started, the learning process can be a bit of a challenge to navigate. In this video, Jay goes over ten things he wish he knew about Linux when he first started. There's definitely potential for more, if you're interested... *Support Linux Learning (commission earned)* • Become a channel member here on YouTube ➜ 🤍 • Become a Patron on Patreon ➜ 🤍 • Receive a 5% discount on an LPI exam voucher ➜ 🤍 • Set up your own cloud server with Akamai Connected Cloud ➜ 🤍 *Linux-related Gifts* • Mastering Ubuntu Server 4th Edition (Jay wrote that!!! 😲) ➜ 🤍 • Affiliate store for Linux compatible hardware/accessories ➜ 🤍 • Awesome KVM for your Homelab ➜ 🤍 *Time Codes*: 00:00 - Intro 00:47 - Number 1: Unused RAM is Wasted RAM 03:03 - Number 2: High CPU usage is often a good thing 04:22 - Number 3: inodes (and how that impacts available storage space) 06:51 - Number 4: The large number of Linux distributions is a GOOD thing 09:05 - Number 5: Set up LVM on every server 11:08 - Number 6: Nobody memorizes all the commands and options 14:52 - Number 7: Always have a backup distribution 17:31 - Number 8: Version control (Git, etc) isn't only useful for software engineers 19:08 - Number 9: LVM snapshots exist 20:20 - Number 10: Ensure backup jobs reference ALL disks, even those that were newly added *Recommended stand-alone videos from Learn Linux TV* • Essential tweaks for ALL Linux Servers ➜ 🤍 • How to create a bootable flash drive for installing Linux ➜ 🤍 • Installing an operating system for Raspberry Pi ➜ 🤍 • How to connect to a Linux server via ssh ➜ 🤍 • Understanding Linux permissions ➜ 🤍 • OpenSSH Guide ➜ 🤍 • How to better secure OpenSSH ➜ 🤍 • 10 Linux Terminal Tips and Tricks to Enhance Your Workflow ➜ 🤍 • Over 15 Terminal Tricks You Should Learn ➜ 🤍 *Recommended Courses from Learn Linux TV* • Get up to speed with managing an OpenStack Cloud ➜ 🤍 • Learn how to write your own Bash Scripts ➜ 🤍 • Install, configure, and maintain a Proxmox VE Cluster ➜ 🤍 • Automate tedious setup jobs by learning Ansible ➜ 🤍 • Learn how to exit vim (and use it too) ➜ 🤍 *Linux-related Podcasts* • Enterprise Linux Security ➜ 🤍 • The Homelab Show ➜ 🤍 *Fun Linux-related Projects* • Run your own Gitlab CE Server ➜ 🤍 • Build a Kubernetes Cluster on Proxmox ➜ 🤍 • Set up your own Nextcloud Server ➜ 🤍 *Official Learn Linux TV Sites* • Main site ➜ 🤍 • Community ➜ 🤍 *FAQ* • Which distro do I use? ➜ 🤍 • My recording gear (commissions earned) ➜ 🤍 *Content Ethics* • The following article covers the rules and guidelines Learn Linux TV abides by ➜ 🤍 *Disclaimer* LearnLinuxTV produces technical content that will hopefully be helpful to you and teach you something new. However, this content is provided without any warranty (expressed or implied). LearnLinuxTV is not responsible for any damages that may arise from any use of the content and information that's being provided. The viewer is expected to follow best judgement and to make his/her/their best decisions while working with production or non-production software, systems and hardware. #Linux #Devops #cloudcomputing

The ONE operating system to rule them all.

59643
2622
342
00:06:23
06.05.2022

Here is why Fedora is one of the best Linux Distros for people, whether you're a beginner or pro to Linux! Thank you to our sponsor, LocalMonero - a P2P Monero trading platform, visit them to use Monero safely: 🤍 References: Our Linux Hardening Guide - 🤍 PrivacyGuides - 🤍 🤍TheLinuxEXP Fedora video - 🤍 🤍ChrisTitusTech Distro comparison - 🤍 Michael Horn (Won't tag for us) Fedora video- 🤍 🔐 Our Website: 🤍 🕵 Go Incognito Course - to learn about privacy: 🤍 🏫 Techlore Coaching - to get direct support: 🤍 💻 Techlore Forum - to connect with other advocates: 🤍 🦣 Mastodon - to stay updated: 🤍 We cannot provide our content without our Patrons, huge thanks to: Afonso, Boori, BRIGHTSIDE, Casper, Clark, Cyclops, Eldarix, JohnnyO, Jon, kevin, Larry, love your content, NotSure, Poaclu, x 🧡 Join them on Patreon: 🤍 💚 To see our production gear, privacy tools we use, and other affiliates: 🤍 💖 All Techlore Support Methods: 🤍 Timestamps: 00:00 Introduction 00:20 Our Sponsor! 00:57 Reason 1: Privacy & Security 02:10 Reason 2: Ease of Use & Beginner Friendliness 02:49 Reason 3: Countless Options & Day-to-Day Use 05:01 Our Sponsor! 05:37 Recap & Final Words #fedora #linux #distro

Windows is More Secure than Linux

118490
4823
1051
00:10:38
13.03.2020

Windows is More Secure than Linux I recently ran into a Softpedia and TechRadar article making this claim or pointing out that Debian Linux had more vulnerabilities than Windows. It's time to review the article and give you the facts... Articles Referenced: Tech Radar - 🤍 Softpedia News - 🤍 Support My Work - ►► Get Updates, Launch Announcements and More ➜ 🤍 ►► Chris Titus Tech Digital Downloads ➜ 🤍 ►► Product and Service Recommendations ➜ 🤍 ►► My YouTube Gear and Computers ➜ 🤍 Other Places to Find Me - ►► Titus Tech Talk ➜ 🤍 ►► Titus Tech Gaming ➜ 🤍 ►► Chris Titus Fitness ➜ 🤍 ►► Twitch ➜ 🤍 ►► Twitter ➜ 🤍 DISCLAIMER: This video and description contain affiliate links, which means that if you click on one of the product links, I’ll receive a small commission. This helps supports the channel and allows us to continue to make videos like this. Thank you for your support!

TOP LINUX DISTROS - For All

58899
3580
318
00:05:18
23.11.2022

💻LEARN HACKING 🐱‍👤 BUY My Hacking Courses 💻 1. HACKSTARS: 🤍 2. Tech Master Hacking Course: 🤍 3. Quick Hack: 🤍 Buy with your Debit/Credit/Netbanking Quick Hack: 299 Rs Tech Master: 299 Rs HACKSTARS: 299 Rs Top linux distros for all Social Media Links: 🎥 Shorts: 🤍 👍 Facebook: 🤍 🐦Twitter: 🤍 🎦 Vlog Channel: 🤍 📸 Instagram: 🤍

How to Secure a Linux Server with UFW, SSH Keygen, fail2ban & Two Factor Authentication

53178
1611
171
00:20:13
16.08.2020

In-depth guide on how to secure a Linux home server running Ubuntu 20.04. This video explains how to change the default SSH port, how to configure an UFW firewall, how to use ssh key-based authentication, how to install and configure fail2ban, and finally how to setup two factor authentication (2FA). Follow this tutorial on my blog: 🤍 This video is part of my ultimate home server tutorial video series! Part 0: 10 GIGABIT Ryzen Home Server Build: 🤍 Part 1: How to Install Ubuntu Server 20.04 LTS from USB: 🤍 Part 2: How to format and partition hard drives: 🤍 Part 3: You are here :) Part 4: How to set up ZFS RAID10 on Ubuntu 20.04: 🤍 Part 5: How to Install Nextcloud Hub 21 on Ubuntu 20.04: 🤍 Part 6: How to Install Bitwarden on Ubuntu 20.04: 🤍 Check out today's video sponsor IPVanish: 🤍 Timeline: 00:00 - Intro 01:21 - Get a VPN for less than 50$ for a full year! 02:25 - How to change default SSH port 05:26 - How to set up UFW 09:02 - How to set up key-based authentication 12:11 - How to disable password based authentication 12:52 - How to set up fail2ban 16:03 - How to set up two factor authentication Video Resources Thumbnail adapted from: 🤍 Man in the middle attack: 🤍 Privileged ports: 🤍 💻 Gaming Setup: 🤍 📷 Production Gear: 🤍 🎵 Production Music courtesy of Epidemic Sound: 🤍 📝 Blog: 🤍 🐦 Twitter: 🤍 📺 Twitch: 🤍 🎧 Discord: 🤍 #Secure #Server #TechGuides

Linux Security - Securing Nginx

37566
1102
43
00:21:00
05.10.2020

In this video series, we will be taking a look at how to set up, secure, and audit Linux servers. This video will explain the process of securing Nginx. Register for part 2 of the Linux Server Security Series: 🤍 Get $100 in free credits on Linode: 🤍 Our videos are also available on the decentralized platform LBRY: 🤍 SUPPORT US: Patreon: 🤍 Merchandise: 🤍 SOCIAL NETWORKS: Twitter: 🤍 LinkedIn: 🤍 WHERE YOU CAN FIND US ONLINE: HackerSploit - Cybersecurity Training Simplified: 🤍 HackerSploit Forum: 🤍 HackerSploit Academy: 🤍y LISTEN TO THE CYBERTALK PODCAST: Spotify: 🤍 We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms. Thanks for watching! Благодарю за просмотр! Kiitos katsomisesta Danke fürs Zuschauen! 感谢您观看 Merci d'avoir regardé Obrigado por assistir دیکھنے کے لیے شکریہ देखने के लिए धन्यवाद Grazie per la visione Gracias por ver شكرا للمشاهدة #Linux#Security#Cybersecurity

Назад
Что ищут прямо сейчас на
secure linux уколы 이하늬 채수빈 new quake game โดนแกล้ง jeu de role กายหงิด Xiaomi Xgimi H3S zbingz มาดแลน Jai raw francisco manresa ใจร้าว pjy SRI dishonored 2 misssion 6 ချဲဂဏန်း Baofeng UV 5R Shivsena