7 Linux Commands to Check Network Connectivity
Association of Information Technology Professional
MAY 17, 2023
Use these command-line commands to display and troubleshoot network connectivity and performance issues on Windows or Linux systems.
This site uses cookies to improve your experience. By viewing our content, you are accepting the use of cookies. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country we will assume you are from the United States. View our privacy policy and terms of use.
Network World
APRIL 7, 2022
Picking just 10 Linux open source security tools isn’t easy, especially when network professionals and security experts have dozens if not several hundred tools available to them. There are different sets of tools for just about every task—network tunneling, sniffing, scanning, mapping.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
IT Toolbox
JANUARY 13, 2023
UNIX, Linux, and Windows are operating systems with GUIs, hardware support, networking, and file management. The post UNIX vs. Linux vs. Windows: 4 Key Comparisons appeared first on.
Association of Information Technology Professional
JANUARY 31, 2022
It seems like there’s a never-ending array of commands for Linux administrators to remember. Some are for file manipulation, others manage hardware and others configure services or databases.
IT Toolbox
FEBRUARY 22, 2024
Cybersecurity researchers have found new WiFi security vulnerabilities that have made Linux and Android devices susceptible to attack. Learn more about the nature of the threat that has affected several business and home networks.
Tech Republic
AUGUST 2, 2022
The latest Linux kernel released includes changes to networking, CPU architecture, Arm support, graphics and storage. The post Linux kernel 5.19 includes major networking improvements appeared first on TechRepublic.
Tech Republic Data Center
JULY 5, 2023
Linux powers the enterprise. From the cloud to containers and to the backbone of your network, Linux is there working tirelessly to keep your business humming. Whether you use Linux in your AWS, Azure, Google Cloud or your on-premise data center, you use Linux. But what about distribution?
IT Toolbox
DECEMBER 8, 2023
The post Bluetooth Vulnerability Exposes macOS, iOS, Linux, and Android Devices appeared first on Spiceworks. The vulnerability only requires a basic Bluetooth adapter to exploit.
Tech Republic Cloud
JUNE 23, 2023
In this TechRepublic How to Make Tech Work video, Jack Wallen shows you how to install Docker on Linux machines. The post The easiest method of installing Docker on Linux appeared first on TechRepublic.
Tech Republic Security
MARCH 28, 2023
Learn how to protect your Linux server from the fork bomb denial-of-service attack with this video tutorial by Jack Wallen. The post How to prevent fork bombs on your Linux development servers appeared first on TechRepublic.
Tech Republic
MAY 4, 2022
The post How to install the NordLayer VPN client on Linux and connect it to a virtual network appeared first on TechRepublic. If you're looking to employ a solid VPN service for remote workers, NordLayer VPN is an outstanding option. Find out how to install and use the client on both Ubuntu Desktop and Fedora 36.
Network World
JANUARY 12, 2019
If you're contemplating a career in cybersecurity and haven't come up to speed on Linux, now's the time to get ramped up and here's one easy way to do it. Because Linux is open source, tool developers (and you) have a level of access that is unsurpassed. This new book from no starch press was written with people like you in mind.
Tech Republic
SEPTEMBER 25, 2023
Did you know that you can set temporary environment variables in Linux? Learn how to get started with our guide and video tutorial.
Network World
OCTOBER 19, 2020
Deploying password-quality checking on your Debian-based Linux servers can help ensure that your users assign reasonably secure passwords to their accounts, but the settings themselves can be a bit misleading. Get regularly scheduled insights by signing up for Network World newsletters.].
Scott Lowe
MARCH 31, 2023
A little over a month ago I published a post on creating a Talos Linux cluster on AWS with Pulumi. Talos Linux is a re-thinking of your typical Linux distribution, custom-built for running Kubernetes. Talos Linux has no SSH access, no shell, and no console; instead, everything is managed via a gRPC API.
Tech Republic Data Center
MAY 14, 2020
A network bridge allows you to connect segments of your network together. Jack Wallen shows you how to create a bridge with the help of netplan.
TechSpot
JULY 21, 2023
Hosted by The Linux Foundation, the Ultra Ethernet Consortium (UEC) has just been announced with the goal of building a complete, Ethernet-based communication stack architecture for high-performance networking applications.
The Verge
JANUARY 21, 2021
A new Linux port allows Apple’s M1 Macs to run Ubuntu for the first time. While a number of M1 components are shared with Apple’s mobile chips, the non-standard chips made it challenging to create Linux drivers to get Ubuntu running properly. Linux is now completely usable on the Mac mini M1. Network works via a USB c dongle.
TechSpot
MARCH 23, 2024
As data centers continue to evolve and the push for AI becomes universal, tech companies have been flocking to join the Ultra Ethernet Consortium, which launched last summer hosted by The Linux Foundation. UEC focuses on enhancing Ethernet to meet the low latency and high bandwidth requirements of advanced AI. Read Entire Article
Network World
MAY 30, 2022
Malware targeting Linux environments has increased massively in the past year, with threat actors using a variety of techniques to carry out operations.
Venture Beast
FEBRUARY 3, 2021
Linux Foundation takes control of open source Magma project from Facebook to advance adoption of 5G wireless networks. Read More.
Network World
MAY 5, 2022
NFVIS is Linux-based infrastructure software designed to help enterprises and service providers to deploy virtualized network functions, such as a virtual router, firewall and WAN acceleration, Cisco stated. To read this article in full, please click here
Computerworld Vertical IT
MARCH 31, 2023
Apple’s decision to support MAC Address Randomization across its platforms may provide some degree of protection against a newly-identified Wi-Fi flaw researchers say could let attackers hijack network traffic. iOS, Linux, and Android devices may be vulnerable. To read this article in full, please click here
Tech Republic Data Center
MARCH 19, 2020
Every network administrator needs to know how to listen to port traffic on a server. Here's one way to do it on Linux.
Network World
JANUARY 12, 2019
If you're contemplating a career in cybersecurity and haven't come up to speed on Linux, now's the time to get ramped up and here's one easy way to do it. Why Linux is important to security. Because Linux is open source, tool developers (and you) have a level of access that is unsurpassed.
Tech Republic
SEPTEMBER 9, 2022
Jack Wallen ponders the rising tide of Linux malware and offers advice on how to help mitigate the issue. The post The rise of Linux malware: 9 tips for securing the OSS appeared first on TechRepublic.
Tech Republic
OCTOBER 7, 2022
Discover top-rated training courses on Udemy to help you learn or master Linux at your own pace for your professional goals. The post Review these top Linux courses on Udemy appeared first on TechRepublic.
SecureWorld News
MAY 4, 2023
The post adds, "This is the first time the group has created a Linux binary. Its locker ransomware infects Linux, NAS, and ESXi hosts and appears to be inspired by Babuk ransomware's leaked source code." Both asymmetric and symmetric encryption make it impossible to decrypt files without the attacker's private key."
Linux Academy
MAY 28, 2019
By adding free cloud training to our Community Membership, students have the opportunity to develop their Linux and Cloud skills further. Each month we will kick off our community content with a live study group allowing members of the Linux Academy community to come together and share their insights in order to learn from one another.
Venture Beast
JUNE 22, 2021
The Linux Foundation's Open Voice Network aims to develop standards around voice assistant technologies, including speech recognition. Read More.
Linux Academy
APRIL 30, 2019
By adding free cloud training to our Community Membership, students have the opportunity to develop their Linux and Cloud skills further. Each month, we will kick off our community content with a live study group allowing members of the Linux Academy community to come together and share their insights in order to learn from one another.
Tech Republic
OCTOBER 14, 2022
Learn Linux from the ground up using this Skillshare resource so you can score your dream IT job. The post Complete this Linux training course to get your dream IT job appeared first on TechRepublic.
CIO Musings
APRIL 6, 2016
Unix has become Linux, and it is running on an amazing variety of devices. New lineages of Linux have emerged.Some are highly specialized, some are more generic. I run Linux on a half dozen platforms at home. A quick google search revealed not one, but several Linux distros that will run on this unit. Circa 2009.
Data Center Knowledge
MARCH 10, 2015
Big Switch’s Open Network Linux becomes OCP’s reference network OS Read More. Networking Open Compute'
Linux Academy
NOVEMBER 1, 2019
To continually support your mission to learn and grow, we are always adding new, free courses and resources for developing Linux and Cloud skills. Members of the Linux Academy community come together and share their insights and questions. Microsoft SQL Server on Linux Quick Start. How to Get a Linux Job. AWS Concepts.
ComputerWorld IT Management
AUGUST 5, 2020
And that’s why we’re offering The CompTIA Linux Network Professional Bundle right now at over 90 percent off its regular value. Of course, those who work in IT already know that this is the case. That’s why, for them, it makes sense to keep their training on the cutting edge. To read this article in full, please click here
Tech Republic
JULY 28, 2022
If you're on the hunt for an improved version of the Linux top command, Jack Wallen believes btop is the way to go. The post Btop is a much-improved take on the Linux top command appeared first on TechRepublic.
Linux Academy
MAY 16, 2019
Linux Academy is happy to announce that the new Red Hat Enterprise Linux 8 Distribution is available in the Linux Academy Cloud Playground. Cloud Playground is included in both individual Linux Academy memberships , as well as business memberships. How To Launch Red Hat Enterprise Linux 8 in Cloud Playground.
Association of Information Technology Professional
FEBRUARY 11, 2022
Learn 4 Linux and Windows commands to display IP address settings for network configuration and troubleshooting.
IT Toolbox
JANUARY 19, 2017
Continuing on with the dissection of the anatomy of Linux you may remember that I rambled on a bit about how the kernel modules are used to access the various hardware devices on the computer. Other things like file systems, networking protocols and lower level stuff (real technical term there :) ) can be and are handled by kernel modules.
Network World
JUNE 26, 2019
While not nearly commonly seen on Linux systems, library (shared object files on Linux) injections are still a serious threat. Two-Minute Linux Tips: Learn how to master a host of Linux commands in these 2-minute video tutorials ]. In this post, I'll cover one method of attack and some ways that it can be detected.
Network World
MAY 22, 2018
There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems. sudo adduser shark Adding user `shark'.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content