Image
Linux tool alternatives, configuring firewalls, and more sysadmin tips
Check out Enable Sysadmin's top 10 articles from July 2022.
July 2022 was another excellent month for Enable Sysadmin. During the month, we published 24 new articles and received more than 770,000 reads from over 520,000 readers across the site.
Today, we are looking back at our top 10 articles of July to give you a chance to catch up on any of the great content you might have missed. In this list, you will see various topics covered, and we are confident that some, if not all, will be of interest to you.
If these articles leave you feeling inspired, then we would love to hear from you. Send your article ideas or sysadmin tips to the team at enable-sysadmin@redhat.com.
Image
Consider swapping Linux tools for these alternatives that provide more features and functionality.
Image
Learn how to install, configure, and use firewalld to restrict or allow a computer's access to services, ports, networks, subnets, and IP addresses.
Image
Use the chage command to force users to change their passwords to comply with your password-aging policies.
Image
Learn how to use Nmap scans to check if systems are online and find problems in your network.
Image
Although YAML is considered easy to understand, its syntax can be quite confusing. Use this guide to the basics.
Image
Are you getting everything you need out of your text editor? Read Enable Sysadmin's recent articles about Linux text editors to find out what you're missing.
Image
Here’s how to configure Linux superuser access so that it's available to those who need it—yet well out of the way of people who don't need it.
Image
Get your infrastructure running quickly and reliably by automating your configuration using Jinja2 templates for Ansible.
Image
Red Hat Enterprise Linux's image builder service saves time and reduces complexity when deploying optimized systems across datacenters and cloud footprints.
Image
Ansible Vault lets you keep sensitive data, such as passwords and keys, in encrypted files. Here’s how to use it in playbooks to improve automation workflow safety.
Topics:
Linux administration
Troubleshooting
Vicki Walker
Vicki Walker is Managing Editor of Enable Sysadmin and Enable Architect for Red Hat. She has more than 20 years of experience in technology publishing for companies including InformationWeek.com, Dark Reading, SAP, BlackBerry, and Network Computing. More about me