<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Curious about how StrongDM works? 🤔 Learn more here!
Search
Close icon
Search bar icon
blog /
How to List Users in Linux (9 Methods with Examples)

How to List Users in Linux (9 Methods with Examples)

Need to keep tabs on who has access to your organization’s Linux system? This guide explores nine methods, with examples, that can help you quickly list users.
SCP Command in Linux: 10 Essential Examples

SCP Command in Linux: 10 Essential Examples

Discover 10 ways to leverage the SCP command in Linux. Learn how to incorporate options for specific file transfers and how to deal with common errors.
How To Use SSH to Connect to a Remote Server (Windows, Linux & Mac)

How To Use SSH to Connect to a Remote Server (Windows, Linux & Mac)

Secure Shell (SSH) is one of the most effective ways to access and manage remote systems. This technology encrypts communications between the client and the server, enhancing system security and preventing unauthorized access. Another important benefit of SSH is its simplicity. This technology is relatively easy to use with various tools and clients, as we will demonstrate below. Plus, you can also use SSH for file transfers, running commands, and even tunneling. This guide explains how to use
How to Create Users in Linux with useradd (Step-by-Step)

How to Create Users in Linux with useradd (Step-by-Step)

Setting permissions, revoking access, and performing other user management duties in Linux can improve your system's security and organization, ensuring users can access the resources they need when they need to. The useradd command lets you create, modify, and check user accounts, helping you handle multi-user environments across various Linux distributions.
How to Change Password in Linux: A Step-by-Step Guide

How to Change Password in Linux: A Step-by-Step Guide

Explore our in-depth guide on how to change and edit passwords in Linux using various commands and tools. Also, learn some advanced Linux password management techniques.
How to Extract or Unzip .tar.gz Files in Linux (With Examples)

How to Extract or Unzip .tar.gz Files in Linux (With Examples)

A .tar.gz file is a compressed archive file format that combines the tar and gzip formats. These files are popular among system administrators, developers, and regular computer users for archiving and compression. You might need to extract or unzip .tar.gz files if you're transferring big datasets or distributing software with Linux, the third-most popular desktop operating system in the world.
15 Kubernetes Security Best Practices in 2024

15 Kubernetes Security Best Practices in 2024

Kubernetes (K8S) has revolutionized software development, but managing such a complex system with numerous components can be challenging. Fortunately, there are several best practices your team can adopt to secure your K8S environment and reduce your attack surface. By implementing these Kubernetes ...
Kubectl Cheat Sheet - Kubernetes Commands (Basic to Advanced)

Kubectl Cheat Sheet - Kubernetes Commands (Basic to Advanced)

Kubernetes is a popular tool for managing synchronized groups, or clusters, of computers. Users employ it to configure and deploy applications in parallel across clusters on your networks. The kubectl command line tool in Kubernetes lets you send instructions to and receive information from your clusters. This kubectl cheat sheet is a quick guide to getting started with kubectl, including installation, configuration, key commands, and efficiency tips.
How to Prevent SQL Injection Attacks: 6 Proven Methods

How to Prevent SQL Injection Attacks: 6 Proven Methods

SQL injection attacks remain one of the most prevalent and dangerous threats to database security. These attacks can compromise sensitive data, disrupt operations, and cause significant financial and reputational damage. Understanding how to prevent SQL injection attacks will help you foster a security-conscious organizational culture.
How to Kill a Process in Linux: Commands and Best Practices

How to Kill a Process in Linux: Commands and Best Practices

There are multiple situations where it is necessary to terminate a process – for example, when the program does not respond or freezes, when there are detected traces of the malicious work of an application, or when one process consumes far too many system resources, and this list goes on. Learning how to kill a process properly is a vital skill that can help keep your various systems healthy and functioning optimally.
Linux Commands Cheat Sheet: Basic, Advanced & More

Linux Commands Cheat Sheet: Basic, Advanced & More

This article explores essential Linux commands, ranging from navigation, file management, text manipulation, system maintenance, user management, process management and more.
How to Restart Kubernetes Pods with Kubectl: 5 Methods

How to Restart Kubernetes Pods with Kubectl: 5 Methods

Kubernetes pod restarts are important for efficiently managing containerized applications in a dynamic microservices architecture. Understanding how to effectively restart pods using kubectl will help you streamline operations and minimize downtime. This article describes five methods to restart Kubernetes pods empowering you to maintain application health and performance confidently.
XZ Utils Backdoor Explained: How to Mitigate Risks

XZ Utils Backdoor Explained: How to Mitigate Risks

Last week, Red Hat issued a warning regarding a potential presence of a malicious backdoor in the widely utilized data compression software library XZ, which may affect instances of Fedora Linux 40 and the Fedora Rawhide developer distribution. CISA, or Cybersecurity & Infrastructure Security Agency, confirmed and issued an alert for the same CVE.
How to Remove a Directory in Linux (rm & rmdir)

How to Remove a Directory in Linux (rm & rmdir)

In every aspect of Linux system administration, properly removing directories is not just a routine task, but an important aspect of maintaining system integrity and protecting data. This guide explains the importance of removing directories, and the requirements for safe removal, and provides step-by-step instructions on how to efficiently remove directories using the rmdir and rm commands.
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. 👀