Author Archives: tyler

About tyler

I would like to remain as anonymous as possible, so I am going to be somewhat vague. I have been working in IT for 15 years. I have experience with PC repair, software development, security, and systems administration. Over the years I have built my skills through self-study, military training, formal education, certification programs, vendor training, coursera.org, and work experience.

LPI Linux Essentials Objective 5.3 – Managing File Permissions and Ownership

By | 2020-12-22

Objective 5.3 covers basic file permissions and ownership. I already have a guide covering this topic pretty well, so I will refer you to it. For understanding setuid and setgid programs, I wrote a guide demonstrating how they work. If you end up working with Linux professionally, you will need to understand file permissions very… Read More »

Using a Proxy With DNF

By | 2020-11-27

Using a proxy with DNF is straightforward. You can edit /etc/dnf/dnf.conf, set the relevant environment variable, or use the shell sub command. DNF supports both HTTP and SOCKS proxies and several authentication methods. Keep in mind a few things when caching package repositories: Package repositories running on HTTPS cannot be cached without something like Squid’s… Read More »

Using a Proxy With Curl

By | 2020-11-21

Using a proxy with Curl is straightforward and flexible. There are a few methods you can use. You can specify the proxy URL on the command line, or set the appropriate environment variable. Using -x This is the most straightforward way to use a proxy server with curl. Using the -x option guarantees that you… Read More »

Following Redirects With Curl

By | 2020-11-12

The curl command is a great tool with a lot of uses. When used for HTTP, it doesn’t follow redirects. However, following redirects with curl is easy. If you are in a hurry, the short answer is the -L option: $ curl http://tylersguides.com > tylersguides.html % Total % Received % Xferd Average Speed Time Time… Read More »

LPI Linux Essentials Objective 2.3 – Using Directories and Listing Files

By | 2020-09-27

This objective is about navigating the filesystem through the command line. Unlike Windows systems, Linux systems don’t use drive letters. Instead, they use mount points. On a Linux system, the filesystem begins at /, known as the root directory, instead of the respective drive letter for the storage device or network share. You access the… Read More »

Linux – How to Tell Which Shell

By | 2020-09-23

The easiest way to tell which shell you are using is by looking at what the exe link points to in your shell process’s /proc directory. You can use the command ls -l /proc/$$/exe. Below is an example: $ ls -l /proc/$$/exe lrwxrwxrwx 1 tyler tyler 0 Sep 22 19:39 /proc/19867/exe -> /bin/bash The special… Read More »

Listing All Users In Linux

By | 2020-09-21

Listing all users on Linux is best done with the getent passwd command. This isn’t the only way, but it should work an practically any system. Unlike other methods, it uses your systems /etc/nsswitch.conf configuration to show users from all sources. The format is the format used in the file /etc/passwd. $ getent passwd root:x:0:0:root:/root:/bin/bash… Read More »

HAProxy LDAP Backend

By | 2020-05-31

There are a few good reasons for setting up an HAProxy LDAP backend. Perhaps the client’s TLS implementation is lacking. Maybe the application only supports a single server and you can’t afford down time. In the latter scenario, setting up multiple address records in DNS with the same domain name. The problem with that is… Read More »