How to Scan a Linux Server for Malware and Rootkit

Worms, viruses, malware and the dreaded rootkit are the very bane of every server administrator’s existence. Depending on architecture, there can be numerous options for code ne’er-do-wells to explore in infected systems, gathering sensitive information and/or costing organizations quite a lot of money in the process. Thankfully, you don’t need to fly a flag of defeat in the face of such cyber-enemies – detecting them on your server is possible, and there are plenty of tools to help you scan your Linux server for malware and rootkit. Best of all, many of these tools are free to use. Related: The Best Antivirus Programs for Ubuntu… Read more

How to Scan a Linux Server for Malware and Rootkit

Worms, viruses, malware and the dreaded rootkit are the very bane of every server administrator’s existence. Depending on architecture, there can be numerous options for code ne’er-do-wells to explore in infected systems, gathering sensitive information and/or costing organizations quite a lot of money in the process. Thankfully, you don’t need to fly a flag of defeat in the face of such cyber-enemies – detecting them on your server is possible, and there are plenty of tools to help you scan your Linux server for malware and rootkit. Best of all, many of these tools are free to use. Related: The Best Antivirus Programs for Ubuntu… Read more

How to Prevent a DDoS Attack with Nginx

Distributed Denial of Service or “DDoS” attacks sequester a server’s resources through abusive digital communication tactics. These types of attacks are the computer world’s organized raid. Numerous bothersome anti-like actions combine to create formidable enough threat to halt a seasoned server in its tracks. Worst of all, there happen to be multiple means of waging such guerilla web warfare against unsuspecting servers. Luckily, servers can be configured to fight back. Nginx, a highly popular server system for Unix machines, comes with enough built-in functionality to greatly limit the effectiveness of DDoS attacks. Here are a few effective options for handling such threats on an Nginx-powered… Read more

How to Monitor Nvidia GPU in Linux

Even with one of the best Linux distros for gaming installed, you may still struggle with the performance of your GPU if it isn’t properly configured. Checking the management tool for your particular graphics card could help you determine if there are any problems or issues. If you have an Nvidia GPU, there are two tools on Linux to help you monitor its performance — NVTOP and Nvidia-SMI. Using NVTOP If you want to monitor the usage of your GPU in real-time, you’ll need to give NVTOP a try. You’ll need to be using the… Read more

How to Copy/Move a Docker Container to Another Host

Since Docker containers are little boxes of software, so to speak, you can copy and move them around from computer to computer. However, this is not often discussed, probably because larger organizations set up their own repositories, where they can customize their own images and distribute across their servers as they see fit. But you shouldn’t have to go through the trouble of setting up your own line of distribution if you occasionally need to move one or more containers around. It may be that you worked on a Docker instance on your local computer and decided to move it to… Read more