Mar 5 · 6 min read · A practical, reproducible guide for RHEL/Rocky/Alma and Debian/Ubuntu, with Ansible + Molecule examples. TL;DR: Secure PAM with pam_pwquality (strong passwords), pam_faillock (brute-force protection)
Join discussion
Mar 1 · 4 min read · In this guide, we'll install Rocky Linux on VMware Workstation Pro to use it in a DevOps home lab environment. What is Rocky Linux, and why is it in this series? Rocky Linux is a community-driven ente
Join discussionFeb 9 · 6 min read · Today we are tackling the single most confusing topic in modern Redhat Linux System Administration. We are going to deploy a containerized service. Sounds easy, right? podman run and you're done? Wrong. Today, you must deploy a Rootless Container tha...
Join discussionJan 14 · 3 min read · Linux is a multi-user operating system, so it needs a strong permission system to control who can access what.File permissions and ownership define security, access control, and system stability. In this blog, we will learn: How Linux permissions wo...
Join discussionJan 13 · 2 min read · Linux is controlled mainly through the command line.Knowing basic Linux commands helps you: Navigate the file system Manage files and directories Inspect system information Work efficiently on servers This guide covers the most commonly used Li...
Join discussionJan 12 · 3 min read · What is package management? Package management is the process of: Installing software Updating packages Removing applications Managing dependencies In Linux, software is distributed as packages and handled by package managers. 📌 A package cont...
Join discussionJan 8 · 1 min read · Paying 4 years of tuition at Humphreys University for a mostly theory based experience, limited labs, and no built-in job guarantee is now optional. With AlNafi, you can earn an EduQual Level 6 Diploma in Artificial Intelligence Operations - equivale...
Join discussionNov 10, 2025 · 13 min read · Welcome back! 👋 Day 5 of the 100 Days Cloud DevOps Challenge, and today we're diving into SELinux - Security-Enhanced Linux. This is one of those topics that makes many sysadmins nervous, but it's actually a powerful security tool once you understan...
Join discussion