Cockpit is a service for Linux that provides a web-based interface for managing and monitoring hosts. It can be deployed in any size organization, even a small office, and it’s a great way for home users to maintain the family IT infrastructure. I use it to manage and monitor all of the computers in my house—including Raspberry Pi. Cockpit is a free and open source software project released under the LGPL v2.1+. It is sponsored by Red Hat and included in Red Hat Enterprise Linux as the RHEL Web Console.
How-To Geek: How to Use tmux on Linux (and Why It’s Better Than Screen). https://www.howtogeek.com/671422/how-to-use-tmux-on-linux-and-why-its-better-than-screen/
Interested in using containers to isolate processes? Then explore the world of chroot jails: the original containers.
howtogeek.com: How to Use the fold Command on Linux.
ZDNet: Linus Torvalds prepares to wave goodbye to Linux floppy drives.
Good article that serves as a reminder just how easy it has become to work with Linux. Even though the article talks about CentOS the same strategy would work with Ubuntu, Debian, or just about any other flavor of Linux.
Windows 10 is getting a Microsoft-built Linux kernel | ZDNet https://www.zdnet.com/article/windows-10-is-getting-a-microsoft-built-linux-kernel/
Linux 5 is on the way | ZDNet
User namespace allows you to specify a user identifier (UID) and group identifier (GID) mapping to run your containers. This means you can run as UID 0 inside the container and UID 100000 outside the container. If your container processes escape the container, the kernel will treat them as UID 100000. Not only that, but any file object owned by a UID that isn’t mapped into the user namespace will be treated as owned by “nobody” (65534, kernel.overflowuid), and the container process will not be allowed access unless the object is accessible by “other” (world readable/writable).
Podman and user namespaces: A marriage made in heaven | Opensource.com https://opensource.com/article/18/12/podman-and-user-namespaces