Quiet the Kernel: Blacklist Modules
Learn how to stop unwanted kernel modules from loading, with hands-on commands and persistent configuration.
Learn how to stop unwanted kernel modules from loading, with hands-on commands and persistent configuration.
Let the system pull required kernel modules and their dependencies automatically.
Quickly inspect which kernel modules are loaded and why they matter for systems and troubleshooting.
Enable, restrict and persist the kernel's magic SysRq so a stuck system can be steered from keyboard or scripts.
Manage virtual terminals, switch sessions, and inspect who is logged in on Linux.
Turn a regular file into a block device to mount, format or encrypt it and learn exact commands to do it safely.
Run quick, repeatable IO benchmarks to quantify filesystem performance with fio and learn how to interpret the results.
Identify files by their magic numbers using the file command.
Quickly inspect and extract .tar.xz archives using tar and xz tools, safely and efficiently.
Keep archives compact and confidential by combining tar with modern encryption tools for safe transport and storage.
Find which tmpfs instances are active, inspect their options and size, and act on them from the shell.
Harden login security by automatically locking accounts after repeated authentication failures.
Configure PAM to enforce strong, system-wide password rules and reject weak credentials at the point of change.
Practice triggering and tracing PAM authentication decisions to find failures fast.
Learn to read, test and reason about the files under /etc/pam.d so you can diagnose authentication behavior quickly.
Learn to set, change and remove account expiry dates from the command line to control temporary access quickly.
Quickly spot and manage failed login attempts using the faillog utility to detect locked accounts and brute-force activity.
Learn how to notify users, send polite signals, and escalate to forced termination without risking data loss.
Quickly discover who is logged in, from where, and what they are doing using simple command-line tools.
Create, inspect and extract compressed archives quickly on the command line.
Learn how to change Unix file and directory permissions quickly and safely with practical commands.
Quickly produce and check MD5 checksums on the command line to verify file integrity.
Practical steps to generate, deploy and remove SSH keys so access stays secure and manageable.
Hands-on steps to find why users cannot authenticate and how to act.
Quickly produce and verify SSH key fingerprints to ensure host authenticity and key integrity.
Control default file permissions per user to protect data and workflows.
Quickly discover the mask that shapes new file and directory permissions.
Hands-on commands to verify and troubleshoot IPv6 reachability from the shell.
Quick, reversible steps to turn off IPv6 at runtime for diagnostics and compatibility checks.
Turn on IPv6, verify addressing, and configure kernel and network tools so your Linux host speaks the modern Internet protocol.
Use telnet as a quick raw TCP probe to verify service reachability and exchange minimal protocol data.
Quickly discover which login shells a user has and whether those shells impose restrictions.
Find defunct processes fast and learn how to make the parent reap them.
Spot processes adopted by PID 1 and reclaim control of stray jobs quickly.
Practical steps to mount tmpfs with the right options to balance speed and security.
Locate and interpret authentication entries in system logs to spot failed logins and suspicious access.
Quickly list and inspect shell resource limits to troubleshoot and tune processes.
Edit the systemwide bash startup file to set aliases, environment and behavior for every interactive shell.
Set system-wide environment variables for all login shells with a single file.
Do quick, accurate arithmetic directly in the terminal with the bc calculator.
Make newly installed shared libraries visible to the runtime linker without rebooting.
Use ldconfig to inspect and refresh the shared library search paths that the dynamic linker uses.
Quickly reveal which shared libraries a program needs and find missing dependencies before they stop you.
Trace what a program asks the kernel to do and find bugs, permission problems or surprises.
Prevent a single account from spawning runaway processes with a quick shell limit.
Create a FIFO with `mkfifo` and let processes exchange data through a filesystem entry.
Use the wc command to count words, lines, bytes and characters on the command line and get fast file statistics.
Use the simple `seq` generator to run commands repeatedly without writing long loops.
Quickly measure how long a command runs and interpret real, user and sys times.
Quickly combine columns from multiple text files on the command line and reshape data with simple options.
Learn to slice big files into manageable parts using the split command
Efficiently build file lists with find and execute commands in bulk with xargs.
Search text inside files quickly from the command line and turn patterns into action.
Fast command-line recipes to locate the files that steal your disk space.
Quickly discover which mount options are currently active on a system and why they matter.
Access ISO files like normal filesystems without burning media.
Hands-on steps to restore GRUB or EFI boot entries using a live system and minimal tools.
Hands-on raw disk I/O measurements with the dd tool to get a quick view of write and read performance.
A practical guide to set and use filesystem labels so volumes are easy to identify and mount.
Quickly locate the UUIDs that tie disks to mounts and make system boots predictable.
Quick, practical ways to read laptop battery status from the Linux command line.
Read the system’s DMI/SMBIOS tables to discover hardware details quickly.
Swap cron for systemd timers to schedule tasks with tighter integration, logging and dependency control.
Inspect system timers, verify clock sources and measure drift to troubleshoot missed or delayed jobs.
Learn how to list and remove scheduled at jobs from the command line.
Inspect and manage one-time "at" scheduled jobs from the shell.
Schedule single-run commands fast from the shell.
Validate and preview cron timing with quick CLI checks and a tiny parser to avoid scheduling surprises.
Keep growing log files in check by rotating, compressing and pruning them automatically.
Learn to route, drop, and rewrite messages with rsyslog filters for clearer log management.
Practical commands and checks to read, test and troubleshoot the logs rsyslog writes.
Change boot settings, kernel options or timeout and then regenerate GRUB2 configuration safely.
Learn how to set and regenerate GRUB timeout so machines boot predictably and quickly.
Learn how to locate and verify bootloader settings so the correct kernel and options are used at boot.
Practical steps to edit and regenerate the Linux initramfs for boots, encryption and rescue scenarios.
Recreate the early userspace image to recover boots and include new drivers quickly.
Quickly read what the kernel received at boot and diagnose boot issues.
Quickly inspect current CPU frequencies, governors and scaling behavior from the command line.
Quickly visualise parent-child relationships of running processes with pstree.
Use the watch utility to rerun and observe command output so he can spot changes live.
Hands-on steps to set, verify and persist the default route so outbound traffic reaches the right gateway.
Remove stale Ethernet-to-IP mappings to restore connectivity or test neighbor discovery.
Quickly inspect and manage the ARP cache to diagnose local network reachability and identify MAC addresses.
Quickly inspect and understand the kernel routing table using the classic Linux `route` command.
Bind names to IPs so hostnames resolve reliably across boots and network changes.
Quickly locate latency and packet loss along a route using a single interactive command-line tool.
Learn to inspect sockets and verify connectivity quickly using the `ss` utility on Linux.
Keep package sources authentic by configuring repository GPG keys and signing verification for apt repositories.
Quickly turn foreign binary packages into Debian-format packages to test or install them on Debian-based systems.
Learn to inspect and extract files from RPM packages without installing them.
Learn to inspect installed RPM packages with practical commands and examples.
Choose which repository or version apt should prefer and stop unwanted upgrades or downgrades.
Learn how to reveal what a package needs before you install it and avoid surprises.
Refresh the system's view of available packages so installations and upgrades know what is current.
Set a persistent system name so the machine keeps a stable identity across boots and services.
Quickly locate listening sockets and the processes that own them to troubleshoot services and ports.
Run a few simple cat commands to observe kernel entropy, blocking behavior and where randomness comes from.
Find the folders that eat your disk with a fast, interactive terminal browser.
Quickly check how long a Linux host has been running and how busy it is.
Quickly find and stop processes by name using the pkill command.
Quickly find which shell processes are running on a Linux host and inspect how they were started.
Quickly change and persist virtual-console keyboard mappings.
Create unique, race-free temporary files and directories for scripts and tools.
Edit your bashrc to add, reorder or fix the PATH so personal tools run without typing full paths.
See which environment variables your shell exports and how they influence processes.
Use the simple `pmap` snapshot to spot which memory segments grow and find leaks fast.
See appended log lines instantly from the shell and debug in real time.
Quick methods to discover which shells are present and which shells users actually have assigned.
Switch a user's login shell safely and immediately, with commands and checks you can run right now.
Hands-on steps to compile, enable and manage locale definitions on Linux using localedef and locale-gen.
Quick checks and fixes to ensure the system uses the correct language and character encoding.
Display a command's output on the screen while saving it to a file, and learn practical tricks to split streams.
Learn how to shape the bash prompt so it becomes a practical source of context and reduces mistakes.
Practical steps to remove command history from your shell while understanding the limits of secure deletion.
See, recall and reuse past commands quickly with the shell builtin history.
Quickly discover who is logged in and what he is doing, using small, reliable commands.
See which connections use your bandwidth in real time with a compact, command-line viewer.
Learn how to grow and shrink filesystems without losing data and how to avoid common pitfalls.
Change or convert filesystem labels safely across ext4, xfs, btrfs, vfat and ntfs using concrete commands.
Use parted to inspect disk labels, partitions and free space quickly and safely.
Hands-on shell recipe to add swap space quickly and safely on a Linux host.
Turn a spare partition into usable swap in minutes and avoid out-of-memory troubles.
Quickly discover whether the filesystem is out of inodes and how to act before services fail.
Grant specific kernel privileges to binaries so they can do one job without running as root.
Quickly discover which POSIX capabilities a binary carries and why that matters for system security.
Quickly change how SELinux treats services without rewriting policies.
Switch SELinux into permissive mode briefly to observe denials without blocking execution and speed up troubleshooting.
Quickly see which SELinux contexts files, processes and users carry and decide what to do next.
Map the root, learn where services, logs and users live, and gain confidence navigating any Linux host.
Control name-to-IP mapping on a single Linux host quickly and predictably.
Quickly inspect active and scheduled systemd timers from the command line and act on them.
Quickly check whether a file is locked against modification using `lsattr` and related tools.
Use low-level filesystem attributes to prevent modifications and deletions with a single command.
Decide who receives cron output by configuring MAILTO, silencing noisy jobs, or wiring cron to an MTA.
Learn where cron writes its messages and how to extract the lines that tell you what ran and why.
Practical steps to change when and how logrotate rotates your log files.
Practical ways to read rotated and compressed log files without breaking rotation.
Push in-memory journal entries to persistent storage with a quick journalctl command.
Quickly inspect and control how much disk space the systemd journal consumes, and reclaim space without breaking logging.
A hands-on guide to make scripts run at boot, even on systemd systems.
Set up safe, unattended package updates so systems stay secure with minimal hands-on time.
Use systemd's isolate to jump the system into another target quickly and safely.
Quickly broadcast text messages to every logged-in terminal to announce maintenance or urgent notices.
Plan and run timed halts and reboots from the command line with practical examples and safety tips.
Create, encrypt and transfer archives over SSH with practical, secure commands.
Learn how to create and manage compressed zip archives from the command line.
Learn how to compress and decompress files quickly on the command line using gzip.
Archive, compress and restore files with a single, reliable command.
Quick, practical steps to deny traffic from malicious IP ranges using iptables.
Practical steps to persist and recover firewall rules using iptables-save and iptables-restore.
A hands-on guide to write and apply basic iptables firewall rules that protect SSH and web services.
Turn a Linux host into a simple router by enabling kernel IP forwarding and try the commands yourself.
Turn the MOTD into a helpful, secure and dynamic login message.
Concrete actions and commands to make SSH access resilient against common attacks.
Allow or deny SSH logins per account using sshd configuration and related controls.
Generate, install and manage SSH key pairs to replace passwords for safer remote access.
Learn how to quickly and securely transfer files between machines using scp, the SSH-based copy tool.
Practical steps to probe ports and debug services using nc.
Inspect DNS records, reverse lookups and server-specific queries with the host command.
Run a few `dig` commands to verify name resolution, understand answers, and find where things break.
Learn to read and change Linux routing tables to steer packets where you need them.
Quickly add a runtime IP to an interface for testing, maintenance or one-off services.
Hands-on steps to bring interfaces and daemons back without guesswork.
List and inspect active TCP, UDP and UNIX sockets from the command line to troubleshoot and secure a Linux host.
See which processes are reading and writing the disk right now and hunt down bottlenecks.
Quickly inspect processor topology and capabilities from the command line using a single utility.
Quickly spot which disks are busy and measure request rates and latencies.
Read hardware IDs, find drivers and debug PCI devices from the shell.
Apply kernel parameter tweaks now and make them persistent across boots using the right files and commands.
Apply Linux kernel tunables at runtime for performance or security with practical examples
Inspect where time is spent during boot and act on concrete slow services.
Practical, command-line ways to list and inspect the daemons running on a Linux host.
Quick, practical commands to find how long a Linux host has been running and what the numbers mean.
Find failed systemd units fast and fix services with concrete commands.
Turn a script or program into a managed service that starts at boot and restarts on failure.
Make chosen services start automatically at boot by enabling their unit files with systemctl.
Learn to write, enable and troubleshoot systemd unit files so services behave predictably during boot and runtime.
Quickly inspect recent kernel messages to diagnose hardware and boot-time issues.
Practical, command-line ways to disable and re-enable Linux accounts for maintenance and security.
Quick commands to find the last system boot time and why it matters.
Quickly see who is logged in, where from, and how long sessions have been idle.
Enforce per-user resource caps at login to prevent resource exhaustion and keep systems stable.
Enforce password aging, warnings and account expiry using the chage command.
Quickly list successful and failed user logins to investigate access patterns and spot anomalies.
Create a second filename that points to the identical file data on disk without duplicating bytes.
Quickly reveal inode details, timestamps and permissions for any file using the stat utility.
Small commands, big time savings when inspecting files.
Learn to create and apply diff patches on the command line to update files reliably.
Quickly find and understand file differences from the shell.
Learn to sort lines alphabetically using the GNU sort command and related tools.
Practical text reshaping and data extraction at the shell prompt using awk.
Use sed to apply quick, repeatable edits directly to files from the shell.
Practical, hands-on tips to extract fields and fixed-width columns quickly with the cut command.
Quick, practical steps to extract, parse and investigate sudo events from syslog and the systemd journal.
Create persistent, safe aliases to shorten commands and speed up your shell workflow.
Quickly change your PATH for a session or a single command to test tools without permanent edits.
Quickly list and control the process environment to debug scripts and run programs with tailored variables.
Learn to map what a service needs and what needs it using systemctl and a few inspection tricks.
Learn practical, low-level package control to inspect, install, and remove .deb files directly on Debian-based systems.
How to detect and rebuild a corrupt RPM database quickly and safely from the command line.
Learn to install and verify RPM packages from local files, handle dependencies, and choose the right tool for the job.
Fetch RPMs from configured repositories without installing them, useful for offline systems and audits.
Search package metadata locally and inspect details with the apt-cache tool to find the right Debian/Ubuntu package quickly.
Quickly discover the running Linux kernel release with a single command.
Identify hung or runaway Linux processes and terminate them reliably using the kill command and signals.
Quickly move tasks between background and foreground to stay productive on the command line.
Make devices and network shares mount automatically and reliably at boot.
Discover when a filesystem has run out of inodes and how to diagnose it quickly with common command line tools.
Quickly inspect disks, partitions and mounts with a single, glanceable command.
Keep runaway programs in check by restricting what a shell and its child processes may consume.
Fast, practical commands to read SELinux mode and full status so you can act with confidence.
Use systemd's tmpfiles.d fragments to create, protect and clean transient files reliably across boots.
Use the uname command to reveal kernel, machine and OS bits in seconds.
Practical steps to check and repair Linux filesystems safely with fsck.
Create a byte-perfect backup of the first 512 bytes so you can restore a damaged boot sector quickly.
Configure autofs to mount file systems on access and free resources when idle.
Use a tiny, built-in tool to reveal CPU, memory and I/O pressure quickly.
Quickly identify listening services and active connections to diagnose and secure a Linux host.
Control NetworkManager connections from the shell to script, debug and automate interface tasks.
Learn how to keep log directories tidy by rotating, compressing and archiving logs with logrotate.
Keep folders identical and efficient by sending only differences with rsync.
Learn how to grant, restrict and audit sudo rights so users can perform administrative tasks without exposing the whole system.
Explore and control live system processes with a fast interactive viewer.
Learn a compact, hands-on approach to harden a Linux host using the Uncomplicated Firewall.
Quickly inspect whether a daemon runs and find the reason when it does not.
Learn how to open, edit and save files with vi and speed up command-line text work.
Learn how to set environment variables so they survive logins and reboots.
Hands-on steps to run, harden and maintain an SSH server and its keys.
Learn to set a static IPv4 address, verify connectivity, and make the change persistent on a Linux system.
Locate files precisely and act on them from the shell, fast and reliably.
Inspect RAM and swap quickly with the free command to spot memory bottlenecks in seconds.
Keep system clocks precise across servers and desktops by configuring reliable NTP synchronization.
Read the kernel's own boot diary to find hardware and driver issues fast.
Practical, step-by-step recovery of root access by booting into single-user mode.
Change the default systemd target that corresponds to classic runlevels and control default boot behavior.
Learn how to create, inspect and safely update symbolic links to manage files and deployments.
Practical, command-line and web-driven workflows for installing, inspecting and controlling printers with CUPS.
Learn to compute and verify SHA-256 checksums from the command line to ensure file integrity.
Hands-on control of kernel drivers and features using modprobe, insmod and friends to shape a running system.
Practical commands to list, inspect and manage loaded kernel modules on a running system.
Add, inspect and remove static routes from the shell to steer Linux traffic exactly where you need it.
Probe each hop between you and a destination to find where packets slow or stop.
Quick, hands-on inspection of connected PCI and USB devices and their drivers.
Learn to add, trust and control package sources so installations stay reliable and secure.
Learn to steer command output and errors into files, other programs, or combined streams to build reliable shell pipelines.
Harness the speed of grep to filter command output and files with precision.
Practical steps to configure system locale and timezone with systemd and common tools.
Control start stop and status of traditional init services quickly from the shell.
Change timeout, kernel flags and defaults to control how Linux boots.
Quick, pragmatic steps to find and fix common network faults using the ip suite and ping.
Learn to create and manage swap files and partitions from the shell to control memory pressure and system behavior.
Learn to pack and unpack files with tar on the command line and move archives around efficiently.
Apply precise per-user and per-group file permissions using setfacl for flexible access control.
Use journalctl to read, filter and follow the systemd journal and find answers in logs quickly.
Learn to snapshot processes with ps and inspect live activity with top to find and fix resource hogs.
Schedule scripts and maintenance jobs reliably using the cron daemon and crontab.
Practical steps to name your machine and make name resolution reliable on modern Linux systems.
Find what fills disks: `df` shows filesystem capacity, `du` exposes directory usage.
Create and remove Unix groups from the shell to shape access and permission boundaries.
Learn to start, stop, enable and inspect systemd services from the command line.
Master command-line package managers to install, update and remove software reliably on Linux.
Learn to bring up an interface, assign an address and make the configuration persistent using real commands.
Learn how to read and act on the files under /var/log to diagnose Linux problems quickly.
Learn how to attach and detach filesystems safely from the command line.
Quickly create filesystems on block devices using the mkfs family of tools.
Hands-on steps to plan and create partitions with fdisk and get disks ready for filesystems or OS installs
Change file and directory permissions quickly using octal or symbolic notation.
Master the chown command to assign files to the right user and group quickly.
Create, control and secure accounts from the shell with practical commands.
Hands-on steps to detect, mount and unmount a physical CD or an ISO image from the command line.
Learn how to locate, filter and understand running processes with the ps command to diagnose issues fast.
List all files, including hidden ones, and inspect permissions, sizes and timestamps with a single command.
Master `ls` to inspect directories fast and confidently.
Discover how the locate command finds files lightning-fast using a searchable database.
Master the `find` command to locate, filter and act on files across a filesystem — fast and safely.