30 Linux Terminal Emulators
This post explores over 30 of the best Linux terminal emulators, each with unique features and functionality, catering to different types of users. This list showcases the versatility and evolution of terminal emulators…

This post explores over 30 of the best Linux terminal emulators, each with unique features and functionality, catering to different types of users. This list showcases the versatility and evolution of terminal emulators…

For enthusiasts, developers, and professionals who prefer the Linux operating system, choosing a Linux-compatible laptop is a pivotal decision. Here are five Linux-compatible laptops that I evaluated in my recent quest for a…

Last week I walked into an empty 5 × 4 ft storage room. By the end of the week, that blank space held a fully functional network core designed to keep a small…
Jul 04, 2025 Every modern app deals with data – this could be in the form of user account info and tracked order details, or it could be powering product searches or visitor…

Linux-powered smartphones are still the dominant force in the global smartphone market in 2025. While some may be surprised by this fact, Linux enthusiasts have every reason to be happy about the continued…

Update: Thankfully, as of release 2020.1, Kali Linux has swapped to a privileged non-root user by default. You will now log in with the user you create during the install process and no…

This article is a follow-up to the previous 90 Linux Commands frequently used by Linux Sysadmins post. Every week, as time allows, I will publish articles on the 90 commands geared toward Linux sysadmins and…

The first thing I did after installing Ubuntu 22.04 LTS was to remove Snap and its snap packages completely. I’m not proud of that approach, as I have nothing against snap packages per…

In my tech journey, I’ve always had an affinity for the cutting-edge, the not-fully-tested waters of the Linux world. Rolling release distributions like Arch, Fedora, or even a custom-installed Kali Linux have been…

This post includes SCP examples. SCP or secure copy allows the secure transferring of files between a local host and a remote host or between two remote hosts. It uses the same authentication…

Let’s pick up right where Part 1 left off: pfSense Firewall Appliance Unboxing. This isn’t a quick-start guide. It’s my logbook from weeks of fine-tuning pfSense. Weeks, not years, so follow along and…

For the past three years, I’ve been putting off an upgrade to my network’s firewall. During that time, I was balancing multiple priorities: maintaining uptime with multiple ISPs, managing VPN performance limitations, and…

May 30, 2025 Ariffud M. 11min Read The LGTM stack – consisting of Loki for logs, Grafana for visualization, Tempo for tracing, and Mimir for metrics – is an open-source observability suite developed…

The sudo command in Linux is one of the most important and widely used commands for managing system permissions. It allows you to run a command as the superuser, giving you elevated privileges…

This iotop command guide follows my previous 90 Linux Commands frequently used by Linux Sysadmins article. As time allows, I will continue to publish articles on the 90+ commands geared toward Linux sysadmins…

May 22, 2025 10min Read Firebase provides comprehensive tools that help you develop and deploy applications more easily. It mainly streamlines the backend setup process by providing pre-configured services like databases and authentication…

If you’ve ever looked at your server and wondered why it’s using swap even though plenty of RAM is available, you’re not alone. This is a common scenario on Linux systems, and it…

Recently, I supported a client with solving MySQL performance issues. There were several areas where MySQL performance issues were addressed. One issue, however, that was overlooked before our communications was that of keeping…