• /home
  • Books
  • Courses
    • Free Courses
    • Paid Courses
  • Shop
  • Forums
  • Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
  • YouTube
  • LinkedIn
  • GitHub
  • Patreon

All Content

⇨

see all

  • Enterprise Linux Security Episode 69 – Red Hat vs Enterprise IT

    When it comes to Linux in the Enterprise, we have quite a few challenges we have to overcome on a day to day basis to ensure we can depend on our technology. We never thought Red Hat themselves would some day become our opponent, but here we are. In this episode, Jay and Joao will discuss discuss the latest impulsive and irresponsible decision Red Hat has made – as well as how that decision results in the company undermining their own customer base, while alienating the Linux Community at the same time.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    Relevant Articles

    • Red Hat’s Announcement
    • Response from Jeff Geerling (frequent contributor to open-source)
    • Red Hat strikes a crushing blow against RHEL downstreams
    • Response from Mike McGrath (Red Hat) regarding these changes
    • Response from Learn Linux TV

    ⇨

    Read more: Enterprise Linux Security Episode 69 – Red Hat vs Enterprise IT
  • The Homelab Show Episode 102: Red Hat & Why Open Source Is Hard

    When it comes to Open Source, there’s always debates about various aspects of it – this isn’t new. But recently, a decision made by Red Hat has put a spotlight on this issue, perhaps a larger spotlight than any other time in recent memory. But it’s not just them – Open Source is sometimes a difficult subject to navigate. In this episode, Jay and Tom will discuss the Red Hat thing a bit, but transition into a much bigger topic – what should we or shouldn’t we expect from open source?

    YouTube player

    ⇨

    Read more: The Homelab Show Episode 102: Red Hat & Why Open Source Is Hard
  • CrowdSec 1.5 Gains New Features – Exploring Block Lists, Post Exploitation Behavior & More!

    CrowdSec is a service that aims to enhance the security of your Linux server – which it does in a very interesting way. Leveraging the power of the very “crowd” it serves, CrowSec is able to build intelligence that benefits every server that has it installed. This service has been discussed on the channel before, but in this tutorial you’ll see some of the new features as of CrowdSec 1.5.

    YouTube player

    ⇨

    Read more: CrowdSec 1.5 Gains New Features – Exploring Block Lists, Post Exploitation Behavior & More!
  • Enterprise Linux Security Episode 67 – No One Else’s Computer

    We’ve all heard the cloud referred to as “Someone Else’s Computer”, but what do you do if you find your data is on No One Else’s Computer? In this example, there was a happy ending (data was restored) but it’s still an important consideration all the same. What do you do if your cloud provider all of a sudden doesn’t have your data? In this episode, Jay and Joao discuss a recent situation in which Azure customers found themselves in a bit of a bad situation.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (smaller file size, lower bitrate)
    • Ogg version

    Relevant Articles

    • Azure DevOps Outage in South Brazil
    • This typo sparked a Microsoft Azure outage

    ⇨

    Read more: Enterprise Linux Security Episode 67 – No One Else’s Computer
  • Debian 12 “Net Install” Installation Walkthrough

    Debian is a distribution loved by many, and one of the most popular of all time. If you’re thinking of installing it on your computer, then this installation guide will cover the “Net Install” method from beginning to end. In this video, you’ll see the process of wiping your drive and replacing your OS with Debian from start to finish!

    Note: The installation screen captures are a lower resolution than normal due to a screen recorder issue.

    YouTube player

    Thanks to Akamai for sponsoring today’s video! Check out their awesome cloud platform to get set up with your very own Linux server!

    ⇨

    Read more: Debian 12 “Net Install” Installation Walkthrough
  • Transferring files with the scp Command (Linux Crash Course Series)

    The Linux Crash Course Series – Teaching you a valuable Linux command/skill/topic one video at a time! This time around, our journey takes us to the Secure Copy (scp) command, which you can use to copy files from one Linux instance to another via SSH. You’ll learn everything you need to know in order to get started with scp so don’t miss this video!

    YouTube player

    Thanks to Akamai Connected Cloud for sponsoring today’s video! Check out their awesome cloud platform and spin up your very own Linux server!

    ⇨

    Read more: Transferring files with the scp Command (Linux Crash Course Series)
  • The Homelab Show Episode 99 – Secondary Distro

    What would you do if your daily driver distribution becomes something else entirely, and no longer fits your use-case? What would you do if your chosen distro all of a sudden went away? Although it seems unlikely, historically – this has happened. And given the fact that the Linux community is going to see a lot of changes in the near future with decisions from upstream distros – it’s never been a better time to choose a secondary distro (just in case).

    YouTube player

    ⇨

    Read more: The Homelab Show Episode 99 – Secondary Distro
  • Demystifying the Top Command in Linux | Linux Crash Course Series

    Welcome to another episode of the “Linux Crash Course” series! In this installment, we delve into the top command in Linux. With hands-on examples, we’ll demystify the top command, explaining its various options and parameters in a beginner-friendly manner. Learn how to monitor system resources, view running processes, and gain insights into system performance in real-time. By the end of this tutorial, you’ll have a solid grasp of using the top command to optimize your Linux system. Subscribe now for more Linux Crash Course tutorials and empower yourself with Linux knowledge!

    YouTube player

    ⇨

    Read more: Demystifying the Top Command in Linux | Linux Crash Course Series
  • Enterprise Linux Security Episode 65 – Open Source Intelligence Tools (OSINT)

    Open Source Intelligence is a very interesting topic – it’s all about the things that might get unknowingly leaked, and this leaked information is perfectly legal to know and possess! The IP address that points to a domain, vacation photos on twitter, or even what you had for lunch can be used against you in order to build a profile. In this episode, Jay and Joao discuss OSINT and some tools that are commonly used to find it.

    YouTube player

    Download links

    • MP3 version
    • MP3 version (lower bitrate, lower file size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 65 – Open Source Intelligence Tools (OSINT)
  • Ubuntu 23.04 Full Review – An Attempt was Made

    Ubuntu 23.04, codenamed the “Lunar Lobster” is here, and along with it comes Linux kernel 6.2 and GNOME 44. While it’s certainly nice to be able to check out the latest GNOME desktop, this release instead ends up being a good example of why non-LTS Ubuntu releases should generally be avoided.

    YouTube player

    ⇨

    Read more: Ubuntu 23.04 Full Review – An Attempt was Made
Previous Page
1 … 5 6 7 8 9 … 25
Next Page
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.