Tagged articles
71 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
Apr 17, 2026 · Information Security

Master Linux Privilege Escalation: Risks, Exploits, and Hardening Guide

This comprehensive guide explains the most common Linux privilege‑escalation vectors—including unsafe SUID binaries, sudo misconfigurations, cron jobs, password and SSH‑key leaks, kernel vulnerabilities, container escapes, and file‑permission flaws—while providing concrete detection commands and practical hardening steps for each risk.

BashHardeningLinux security
0 likes · 23 min read
Master Linux Privilege Escalation: Risks, Exploits, and Hardening Guide
Linux Tech Enthusiast
Linux Tech Enthusiast
Mar 11, 2026 · Operations

What’s the Difference Between Linux su and sudo Commands?

The article explains how the Linux su command switches user identities using the root password, while sudo lets regular users run privileged commands with their own password, comparing their usage, security, logging, permission scope, and suitable scenarios.

LinuxSudoprivilege escalation
0 likes · 6 min read
What’s the Difference Between Linux su and sudo Commands?
Raymond Ops
Raymond Ops
Nov 9, 2025 · Operations

Master Linux Permissions: From su and sudo to chmod and Sticky Bit

This guide explains Linux permission concepts, the role of the shell, how to switch users with su, grant temporary root rights using sudo, modify file and directory permissions with chmod, manage ownership with chown/chgrp, and secure shared directories with the sticky bit.

LinuxPermissionsShell
0 likes · 19 min read
Master Linux Permissions: From su and sudo to chmod and Sticky Bit
Raymond Ops
Raymond Ops
Oct 5, 2025 · Fundamentals

Unlock Linux Permissions: Master Users, Groups, and Access Controls

This guide explores Linux permissions in depth, covering the shell, root and regular user roles, switching users with su, using sudo for privilege escalation, interpreting rwx permission bits, managing file and directory permissions with chmod and chown, understanding umask defaults, and configuring sticky bits for shared directories.

LinuxPermissionsShell
0 likes · 14 min read
Unlock Linux Permissions: Master Users, Groups, and Access Controls
Raymond Ops
Raymond Ops
Sep 4, 2025 · Operations

Master Linux Permissions: Soar Like an Eagle with Essential Commands

This comprehensive Linux tutorial walks you through permission fundamentals, user types, switching users, sudo usage, permission symbols, octal notation, and practical commands such as chmod, chown, chgrp, umask, and the sticky bit to secure and manage your system effectively.

LinuxPermissionsSudo
0 likes · 14 min read
Master Linux Permissions: Soar Like an Eagle with Essential Commands
Liangxu Linux
Liangxu Linux
Aug 19, 2025 · Operations

Master Linux Permissions: From Basic rwx to SUID, ACL, and Hidden Attributes

This guide explains Linux file and directory permissions, covering basic rwx modes, numeric and symbolic chmod, ownership changes with chown/chgrp, special bits like SUID/SGID/SBIT, umask calculations, hidden attributes via chattr/lsattr, ACL management with setfacl/getfacl, and sudo configuration for secure privilege escalation.

ACLLinuxPermissions
0 likes · 51 min read
Master Linux Permissions: From Basic rwx to SUID, ACL, and Hidden Attributes
Open Source Linux
Open Source Linux
Aug 14, 2025 · Operations

Master Linux Permissions: From Basics to Advanced Management

This comprehensive guide walks readers from the fundamental concept of Linux permissions—role and object attributes—to practical commands like chmod, chown, su, and sudo, covering symbolic and octal modes, umask defaults, directory nuances, and best‑practice security measures for system administrators and users alike.

PermissionsSudochmod
0 likes · 15 min read
Master Linux Permissions: From Basics to Advanced Management
Raymond Ops
Raymond Ops
Aug 10, 2025 · Information Security

Master Linux Account Security: PAM, sudo, and GRUB Hardening Techniques

This guide walks you through essential Linux security measures—including system account cleanup, password policies, command history restrictions, PAM authentication modules, sudo configuration, GRUB boot protection, weak‑password detection with John the Ripper, and network port scanning with nmap—to help you harden servers against unauthorized access and privilege escalation.

GRUBInformation SecurityPassword policy
0 likes · 21 min read
Master Linux Account Security: PAM, sudo, and GRUB Hardening Techniques
Raymond Ops
Raymond Ops
Jul 21, 2025 · Operations

How to Secure Linux: Create a Sudo User and Disable Root SSH Login

This guide explains why disabling root SSH access is essential, then walks through creating a privileged user, assigning sudo rights, editing the sshd_config file to reject root logins, restarting the service, and verifying that root login is effectively blocked.

LinuxSudoroot login
0 likes · 5 min read
How to Secure Linux: Create a Sudo User and Disable Root SSH Login
Liangxu Linux
Liangxu Linux
Jul 9, 2025 · Fundamentals

Master Linux Permissions: From Basics to Advanced Control

This guide walks you through Linux permission fundamentals, covering user categories, switching users, sudo usage, permission representation, file types, basic rwx bits, octal notation, and how to modify permissions with chmod, chown, chgrp, umask, as well as directory sticky bits.

PermissionsSudochmod
0 likes · 11 min read
Master Linux Permissions: From Basics to Advanced Control
Raymond Ops
Raymond Ops
Jul 5, 2025 · Operations

Master Linux User Management: Create, Modify, Secure, and Elevate Users Efficiently

This guide walks you through Linux user fundamentals, covering user definitions, essential commands (useradd, usermod, userdel), configuration files, password policies, privilege escalation with su and sudo, and comprehensive group management, providing practical examples and code snippets for effective system administration.

LinuxSudoSystem Administration
0 likes · 25 min read
Master Linux User Management: Create, Modify, Secure, and Elevate Users Efficiently
Liangxu Linux
Liangxu Linux
Jul 2, 2025 · Fundamentals

Master Linux Permissions: su, sudo, chmod, chown, and Sticky Bit Explained

This guide walks through Linux permission fundamentals, covering the shell interpreter, user vs. root accounts, switching users with su and sudo, the meaning of read/write/execute bits, how to modify permissions using chmod, chown, chgrp, the role of umask, and the sticky bit for shared directories.

PermissionsSudochmod
0 likes · 16 min read
Master Linux Permissions: su, sudo, chmod, chown, and Sticky Bit Explained
Open Source Linux
Open Source Linux
Jun 30, 2025 · Operations

Master su and sudo: Switch Users Safely and Harness Linux Privileges

This guide explains the differences between the su and sudo commands, shows how to create and manage users, demonstrates login-shell versus non‑login-shell switching, covers the -c option for one‑off commands, and compares security implications of each method in Linux environments.

LinuxSudoSystem Administration
0 likes · 11 min read
Master su and sudo: Switch Users Safely and Harness Linux Privileges
Raymond Ops
Raymond Ops
Jun 22, 2025 · Operations

Master Linux Permissions: From chmod to SUID, ACLs and sudo

This guide explains Linux file permission fundamentals, covering owner/group/other rights, chmod and chown usage, umask defaults, special bits like SUID/SGID/Sticky, ACL management, sudo configuration, and essential system commands for effective operations.

ACLLinuxPermissions
0 likes · 23 min read
Master Linux Permissions: From chmod to SUID, ACLs and sudo
MaGe Linux Operations
MaGe Linux Operations
Apr 28, 2025 · Fundamentals

Master Linux Permissions: From Basics to Advanced Control

This guide walks you through Linux permission fundamentals, user roles, switching users with su and sudo, permission representation, file types, octal notation, and essential commands like chmod, chown, chgrp, umask, and the sticky bit, empowering you to manage system security confidently.

PermissionsSudochmod
0 likes · 13 min read
Master Linux Permissions: From Basics to Advanced Control
MaGe Linux Operations
MaGe Linux Operations
Apr 23, 2025 · Operations

Master Linux Permissions: User Switching, sudo, chmod, umask & Sticky Bit Explained

This comprehensive guide explains Linux permissions, covering the roles of root and regular users, how to switch users with su, elevate privileges with sudo, manage file and directory access using chmod, chown, chgrp, understand default permission masks with umask, and secure shared directories with the sticky bit, complete with practical command examples and explanations.

PermissionsShellSudo
0 likes · 14 min read
Master Linux Permissions: User Switching, sudo, chmod, umask & Sticky Bit Explained
Liangxu Linux
Liangxu Linux
Feb 6, 2025 · Operations

Master Linux User Management: Create, Modify, Secure Users and Groups

This guide explains Linux user concepts, how to view and manage user accounts and groups with commands like useradd, usermod, userdel, passwd, su, sudo, and groupadd, while covering file locations, UID ranges, password policies, privilege escalation, and practical examples.

LinuxSudoUser Management
0 likes · 25 min read
Master Linux User Management: Create, Modify, Secure Users and Groups
MaGe Linux Operations
MaGe Linux Operations
Jan 30, 2025 · Information Security

Master Linux Account Security: PAM, sudo, GRUB Hardening & Weak Password Detection

This guide details comprehensive Linux security measures, including system account cleanup, password policies, command history limits, terminal auto‑logout, controlled use of the su command via PAM wheel module, PAM authentication fundamentals, sudo configuration, GRUB boot‑parameter protection, weak‑password detection with John the Ripper, and network port scanning techniques.

GRUBNetwork ScanningSudo
0 likes · 21 min read
Master Linux Account Security: PAM, sudo, GRUB Hardening & Weak Password Detection
Liangxu Linux
Liangxu Linux
Jan 19, 2025 · Information Security

Hardening Linux Account Security: User Locks, Password Policies, PAM & Sudo

This guide explains how to secure Linux accounts by disabling logins, locking or deleting users, enforcing password expiration with chage, configuring PAM modules, restricting commands via sudo, protecting the GRUB bootloader, and performing controlled password‑cracking tests with John the Ripper.

GRUBJohn the RipperLinux
0 likes · 10 min read
Hardening Linux Account Security: User Locks, Password Policies, PAM & Sudo
Liangxu Linux
Liangxu Linux
Nov 5, 2024 · Operations

Mastering su and sudo: When and How to Switch Users on Linux

This guide explains the differences between the su and sudo commands, how to create test users, switch between them using login and non‑login shells, employ the -c option, configure sudo privileges via /etc/sudoers, and choose the safest method for privilege escalation on Linux systems.

LinuxShellSudo
0 likes · 14 min read
Mastering su and sudo: When and How to Switch Users on Linux
Liangxu Linux
Liangxu Linux
Oct 28, 2024 · Operations

Mastering SSH, Sudo, PAM, and System Limits on Ubuntu

This guide compiles essential Ubuntu system‑administration techniques, covering SSH configuration, root remote login, key‑based authentication, automated login tools, file transfer with SCP/rsync, sudoers rules, PAM module setup, resource limits via pam_limits and ulimit, and Chrony time synchronization.

Sudochronypam
0 likes · 15 min read
Mastering SSH, Sudo, PAM, and System Limits on Ubuntu
Architecture Digest
Architecture Digest
Oct 27, 2024 · Operations

Understanding and Using su and sudo Commands in Linux

This article provides a comprehensive guide to the Linux su and sudo commands, explaining their differences, usage options such as login-shell and non-login-shell, how to switch users, set passwords, configure sudoers, and practical examples for managing user privileges securely.

LinuxSudoSystem Administration
0 likes · 12 min read
Understanding and Using su and sudo Commands in Linux
Efficient Ops
Efficient Ops
Oct 14, 2024 · Operations

Mastering su vs sudo: When and How to Switch Users on Linux

This guide clarifies the differences between the Linux commands su and sudo, explains their options and effects on the shell environment, shows how to create and manage users, edit the sudoers file, and choose the appropriate method for secure privilege escalation.

LinuxSudoUser Management
0 likes · 14 min read
Mastering su vs sudo: When and How to Switch Users on Linux
Open Source Linux
Open Source Linux
Sep 13, 2024 · Operations

Master SSH, Sudo, PAM, and System Limits on Ubuntu: A Practical Guide

This guide walks you through essential Ubuntu system administration tasks, covering SSH configuration and key management, enabling root login, using sshpass, scp and rsync for file transfer, configuring sudo privileges, mastering PAM modules, setting resource limits with ulimit, and synchronizing time with chrony.

SSHSudoSystem Administration
0 likes · 14 min read
Master SSH, Sudo, PAM, and System Limits on Ubuntu: A Practical Guide
MaGe Linux Operations
MaGe Linux Operations
May 30, 2024 · Operations

How to Redirect Output to Privileged Files Using sudo on Ubuntu

This guide explains why a simple sudo command may still produce a Permission denied error when redirecting output to a file you lack write access to, and presents four practical methods—including running a shell with sudo, using scripts, sudo -s, and sudo tee—to successfully write to such protected files on Ubuntu 18.04.

LinuxShellSudo
0 likes · 4 min read
How to Redirect Output to Privileged Files Using sudo on Ubuntu
Liangxu Linux
Liangxu Linux
Mar 7, 2024 · Information Security

How Windows Is Bringing Linux‑Style sudo to Its Command Line

Windows 11 Insider builds are adding a native sudo command that lets users elevate individual commands with familiar Linux‑style privilege management, offering finer‑grained control than the traditional "Run as administrator" option while reflecting Microsoft's growing embrace of Linux technologies.

Linux compatibilitySudoSystem Administration
0 likes · 6 min read
How Windows Is Bringing Linux‑Style sudo to Its Command Line
DevOps Operations Practice
DevOps Operations Practice
Mar 6, 2024 · Information Security

Comprehensive Linux System Hardening Guide for Production Environments

This guide details practical Linux hardening steps—including disabling SELinux, trimming startup services, applying the principle of least privilege, configuring sudo, synchronizing time, adjusting file descriptor limits, locking critical files, disabling ping, optimizing SSH, changing hostnames, and preventing destructive rm commands—to improve security and stability in production deployments.

LinuxSELinuxSudo
0 likes · 12 min read
Comprehensive Linux System Hardening Guide for Production Environments
MaGe Linux Operations
MaGe Linux Operations
Aug 12, 2023 · Operations

su vs sudo: Which Linux Privilege Command Should You Use?

This article explains the differences between the Linux su and sudo commands, covering how each switches user identity, their security implications, permission scopes, logging behavior, usage methods, and ideal scenarios to help you choose the right tool for privileged operations.

LinuxSudoSystem Administration
0 likes · 6 min read
su vs sudo: Which Linux Privilege Command Should You Use?
Architect's Tech Stack
Architect's Tech Stack
Aug 11, 2023 · Operations

Understanding and Using the su and sudo Commands on Linux

This article explains the differences between the su and sudo commands, demonstrates how to create users, switch between them using login and non‑login shells, shows practical examples with code snippets, and covers sudo configuration via the /etc/sudoers file for secure privilege escalation.

LinuxSudoSystem Administration
0 likes · 13 min read
Understanding and Using the su and sudo Commands on Linux
Open Source Linux
Open Source Linux
Jul 31, 2023 · Operations

When to Use su vs sudo: Choosing the Right Linux Privilege Command

This article compares the Linux su and sudo commands, explaining how each works, their security implications, logging behavior, usage differences, and ideal scenarios, helping users choose the appropriate tool for switching users or executing privileged operations.

LinuxSudoprivilege escalation
0 likes · 6 min read
When to Use su vs sudo: Choosing the Right Linux Privilege Command
Liangxu Linux
Liangxu Linux
Jul 20, 2023 · Information Security

Boost Your Server Security: Essential SSH, User, and Sudo Hardening Steps

This guide walks you through practical Linux server hardening techniques—including SSH configuration tweaks, disabling ICMP ping responses, managing system users and groups, protecting critical account files, and safely granting root privileges—so you can reduce attack surface and improve overall security.

LinuxSSH HardeningServer Security
0 likes · 6 min read
Boost Your Server Security: Essential SSH, User, and Sudo Hardening Steps
Liangxu Linux
Liangxu Linux
May 28, 2023 · Information Security

How to Harden a Linux Server: SSH, User Management, and Sudo Tweaks

This guide walks through practical steps to secure a Linux server, including modifying SSH settings, disabling ping responses, managing users and groups, protecting critical account files, creating new users, and configuring sudo or UID changes to control root access.

LinuxRoot AccessSSH
0 likes · 6 min read
How to Harden a Linux Server: SSH, User Management, and Sudo Tweaks
Open Source Linux
Open Source Linux
May 24, 2023 · Information Security

Boost Your Server Security: Essential Linux Hardening Steps

This guide walks you through practical Linux server hardening techniques—including SSH configuration, disabling ping replies, user and group management, sudoers tweaks, and granting root privileges—to significantly reduce the risk of unauthorized access.

LinuxSSH HardeningServer Security
0 likes · 6 min read
Boost Your Server Security: Essential Linux Hardening Steps
Liangxu Linux
Liangxu Linux
May 10, 2023 · Information Security

Boost Your Server Security: Essential SSH, User, and Root Hardening Steps

This guide walks you through practical steps to secure a newly purchased Linux server, covering SSH configuration changes, disabling ping responses, thorough user and group management, creating new accounts, and three reliable methods to grant root privileges safely.

LinuxRoot AccessSSH Hardening
0 likes · 6 min read
Boost Your Server Security: Essential SSH, User, and Root Hardening Steps
Liangxu Linux
Liangxu Linux
May 5, 2023 · Information Security

Boost Your Server’s Defense: Essential SSH and User Security Tweaks

Learn practical steps to harden a Linux server—including changing the SSH port, disabling root login, blocking ping, managing users and groups, securing critical system files, and configuring sudo—so you can protect your machine from common attacks and unauthorized access.

LinuxRoot AccessSSH
0 likes · 6 min read
Boost Your Server’s Defense: Essential SSH and User Security Tweaks
MaGe Linux Operations
MaGe Linux Operations
Feb 14, 2023 · Operations

Why sudo Ignores Your Aliases and How to Fix It

This article explains why the sudo command bypasses user-defined aliases in Bash, demonstrates the resulting error with common shortcuts like ll, and provides a simple solution using a trailing‑space alias so that sudo respects alias expansion.

AliasBashSudo
0 likes · 3 min read
Why sudo Ignores Your Aliases and How to Fix It
Senior Brother's Insights
Senior Brother's Insights
Aug 3, 2022 · Operations

How to Grant Sudo Privileges to Regular Users on Linux

This guide explains why ordinary Linux users need sudo, how to safely edit the /etc/sudoers file with visudo, interprets each field in typical sudoers entries, and shows step‑by‑step examples for adding both password‑prompt and password‑less sudo access for a new user.

LinuxSudosudoers
0 likes · 6 min read
How to Grant Sudo Privileges to Regular Users on Linux
Open Source Linux
Open Source Linux
Jan 12, 2022 · Operations

Mastering su and sudo: When and How to Switch Users Securely on Linux

This guide explains the differences between su and sudo, demonstrates how to create test users, switch between accounts using login and non‑login shells, configure sudo privileges via /etc/sudoers, and provides practical command examples for secure user management on Linux.

LinuxSudoSystem Administration
0 likes · 14 min read
Mastering su and sudo: When and How to Switch Users Securely on Linux
Liangxu Linux
Liangxu Linux
Oct 31, 2021 · Operations

When to Use su vs sudo? A Practical Guide to Linux User Switching

This article explains the differences between the su and sudo commands, shows how to create test users, demonstrates login‑shell and non‑login‑shell switches, covers the -c option, details sudo’s permission model via /etc/sudoers, and provides a side‑by‑side comparison with practical code examples.

LinuxSudoSystem Administration
0 likes · 15 min read
When to Use su vs sudo? A Practical Guide to Linux User Switching
ITPUB
ITPUB
Oct 21, 2021 · Operations

Understanding the Differences Between su and sudo on Linux: When and How to Use Them

This article clarifies the distinct purposes and usage patterns of the Linux commands su and sudo, explains their parameters such as '-' and '-c', demonstrates user creation, password setting, environment differences between login and non‑login shells, and shows how to configure sudo privileges safely.

LinuxShellSudo
0 likes · 15 min read
Understanding the Differences Between su and sudo on Linux: When and How to Use Them
Programmer DD
Programmer DD
Oct 19, 2021 · Operations

Mastering Linux User Switching: su vs sudo Explained with Real Examples

This article systematically explains the differences between the Linux commands su and sudo, covering preparation steps, usage patterns, parameter effects, practical examples, sudoers configuration, and security considerations to help readers confidently manage user switching and privilege escalation.

LinuxSudoSystem Administration
0 likes · 15 min read
Mastering Linux User Switching: su vs sudo Explained with Real Examples
Laravel Tech Community
Laravel Tech Community
Oct 12, 2021 · Operations

Understanding and Using the su and sudo Commands in Linux

This article systematically explains the differences, syntax, and practical usage of the Linux su and sudo commands, covering user creation, login shells, command‑line options, password handling, sudoers configuration, and a side‑by‑side comparison of their security implications.

LinuxSudoSystem Administration
0 likes · 14 min read
Understanding and Using the su and sudo Commands in Linux
Liangxu Linux
Liangxu Linux
Oct 4, 2021 · Fundamentals

What Does sudo rm -rf Actually Do? A Deep Dive into Linux Deletion Commands

This article demystifies the infamous sudo rm -rf command, explaining how rm works, the role of sudo, the effects of recursive and force options, directory deletion nuances, safety mechanisms, and why misuse can erase an entire Linux system, illustrated with concrete examples and command screenshots.

LinuxSudocommand-line
0 likes · 7 min read
What Does sudo rm -rf Actually Do? A Deep Dive into Linux Deletion Commands
Liangxu Linux
Liangxu Linux
Apr 6, 2021 · Operations

Mastering sudo: Essential Configurations, Tips, and Security Practices

This guide explains sudo's workflow, sudoers file syntax, default options, how to switch visudo's editor, force‑save read‑only files in Vim, use sudoedit safely, adjust session timeouts, set temporary authorizations with cron, and preserve environment variables for secure privilege delegation.

ConfigurationSudosystem-administration
0 likes · 15 min read
Mastering sudo: Essential Configurations, Tips, and Security Practices
ITPUB
ITPUB
Nov 18, 2020 · Information Security

Create a New sudo User and Gain Root on Ubuntu Without a Password – Full Exploit Guide

This article explains a critical Ubuntu vulnerability that lets a standard user create a new sudo account and obtain root privileges without a system password, detailing the exploitation steps, required commands, and the underlying flaw in accounts‑daemon and GNOME Display Manager, plus mitigation advice.

Linux securitySudoUbuntu
0 likes · 7 min read
Create a New sudo User and Gain Root on Ubuntu Without a Password – Full Exploit Guide
Liangxu Linux
Liangxu Linux
Sep 19, 2020 · Operations

Enable or Disable Ubuntu’s Root Account in Minutes

Learn step‑by‑step how to activate the root user on Ubuntu, assign a password, configure sudo for password‑less access, and later lock or disable the root account by expiring its password, with clear command examples and safety tips.

$rootLinuxSudo
0 likes · 4 min read
Enable or Disable Ubuntu’s Root Account in Minutes
ITPUB
ITPUB
Sep 17, 2020 · Operations

Understanding the Key Differences Between sudo and su in Linux

This article explains how sudo and su differ in password requirements, default behavior, scope of privilege elevation, environment handling, and usage syntax, providing clear examples and guidance for choosing the appropriate command in Linux system administration.

LinuxSudoSystem Administration
0 likes · 5 min read
Understanding the Key Differences Between sudo and su in Linux
Liangxu Linux
Liangxu Linux
Sep 16, 2020 · Operations

sudo vs su: When to Use Each Linux Privilege Command

This guide explains the key differences between sudo and su on Linux, covering password requirements, default behaviors, environment handling, command syntax variations, and practical usage tips for switching users or executing privileged commands safely.

LinuxSudoSystem Administration
0 likes · 5 min read
sudo vs su: When to Use Each Linux Privilege Command
Liangxu Linux
Liangxu Linux
Jul 22, 2020 · Operations

How to Fix sudo Missing Environment Variables on Linux

When using sudo, Linux resets the environment, causing custom variables to disappear; this guide explains why, shows the relevant lines in /etc/sudoers, and presents three practical methods—including sudo -E, editing env_keep and secure_path, and creating aliases—to retain needed variables.

BashEnvironment VariablesLinux
0 likes · 4 min read
How to Fix sudo Missing Environment Variables on Linux
ITPUB
ITPUB
Apr 7, 2020 · Operations

11 Must‑Know Linux Terminal Tricks to Supercharge Your Workflow

Discover a curated list of 11 powerful Linux terminal commands and shortcuts—including clipboard tricks, sudo shortcuts, background execution, scheduling, process management, file browsing, shutdown cancellation, and YouTube video downloading—to dramatically boost your productivity and streamline everyday tasks.

Sudocommand-linehtop
0 likes · 10 min read
11 Must‑Know Linux Terminal Tricks to Supercharge Your Workflow
ITPUB
ITPUB
Oct 17, 2019 · Information Security

Understanding the Sudo CVE‑2019‑14287 Vulnerability and How to Mitigate It

The article explains the CVE‑2019‑14287 sudo bug that lets attackers bypass root restrictions by using special user IDs, assesses its severity and real‑world impact, and provides concrete steps—including patch installation and sudoers configuration checks—to protect Linux systems.

CVE-2019-14287Linux securitySudo
0 likes · 7 min read
Understanding the Sudo CVE‑2019‑14287 Vulnerability and How to Mitigate It
Efficient Ops
Efficient Ops
Aug 28, 2019 · Operations

How to Harden Linux Server Security: Account, Login, and Boot Controls

This guide details practical Linux server hardening techniques—including account cleanup, password policies, su/sudo restrictions, login controls, and BIOS/GRUB protection—while providing exact command examples for operations teams to quickly improve system security.

Account ManagementLinuxOperations
0 likes · 12 min read
How to Harden Linux Server Security: Account, Login, and Boot Controls
21CTO
21CTO
May 7, 2018 · Operations

Mastering sudo: Essential Linux Privilege Tricks for Everyday Use

This guide walks through common sudo scenarios—granting temporary root rights, fixing permission errors in vim, re‑executing forgotten sudo commands, handling shell built‑ins, and configuring sudo logging—to help Linux users work more efficiently and securely.

LinuxSudoSystem Administration
0 likes · 7 min read
Mastering sudo: Essential Linux Privilege Tricks for Everyday Use
21CTO
21CTO
Apr 28, 2018 · Operations

Mastering sudo: 5 Real-World Scenarios to Elevate Your Linux Permissions

This guide walks through five common sudo use‑cases on Linux—granting temporary root rights, fixing forgotten sudo in vim, re‑executing commands with sudo, handling shell built‑ins, and configuring sudo logging—providing clear examples and configuration tips for system administrators.

LinuxPermissionsShell
0 likes · 7 min read
Mastering sudo: 5 Real-World Scenarios to Elevate Your Linux Permissions
ITPUB
ITPUB
Apr 26, 2018 · Operations

Mastering sudo: 5 Real‑World Scenarios to Elevate Your Linux Permissions

This guide walks through five common sudo use‑cases on Linux—granting temporary root rights, fixing permission errors in vim, recalling forgotten sudo, handling shell built‑ins, and configuring sudo logging—providing clear examples, configuration snippets, and practical tips for system administrators.

LinuxPermissionsSudo
0 likes · 8 min read
Mastering sudo: 5 Real‑World Scenarios to Elevate Your Linux Permissions
ITPUB
ITPUB
Jul 19, 2017 · Information Security

Essential Linux Hardening: Minimalism, Port Tweaks, and Kernel Optimizations

This guide walks through practical Linux hardening steps—including minimal installation, SSH port changes, sudo privilege tailoring, extensive kernel sysctl tuning, firewall adjustments, system version hiding, file protection, and package installation strategies—to boost security and performance while keeping the system lean.

SSHSudoSystem Hardening
0 likes · 6 min read
Essential Linux Hardening: Minimalism, Port Tweaks, and Kernel Optimizations