Customizing my Linux terminal with tmux and Git :: opensource.com


I use GNOME Terminal, mostly because it is my distribution’s default. But what happens inside my terminal is far from “default.” Before I get into how I customize it, here is what it looks like:

Source: Customizing my Linux terminal with tmux and Git :: opensource.com

How-To Geek: How to Use tmux on Linux (and Why It’s Better Than Screen)

How-To Geek: How to Use tmux on Linux (and Why It’s Better Than Screen). https://www.howtogeek.com/671422/how-to-use-tmux-on-linux-and-why-its-better-than-screen/

How to set up Linux chroot jails | Enable Sysadmin

Interested in using containers to isolate processes? Then explore the world of chroot jails: the original containers.

Source: How to set up Linux chroot jails | Enable Sysadmin

howtogeek.com: How to Use the fold Command on Linux

howtogeek.com: How to Use the fold Command on Linux.
https://www.howtogeek.com/538778/how-to-use-the-fold-command-on-linux/

ZDNet: Linus Torvalds prepares to wave goodbye to Linux floppy drives

ZDNet: Linus Torvalds prepares to wave goodbye to Linux floppy drives.
https://www.zdnet.com/article/linus-torvalds-prepares-to-wave-goodbye-to-linux-floppy-drives/

Create a CentOS homelab in an hour

Set up a self-sustained set of basic Linux servers with nothing more than a system with virtualization software, a CentOS ISO, and about an hour of your time.

Source: Create a CentOS homelab in an hour

Good article that serves as a reminder just how easy it has become to work with Linux. Even though the article talks about CentOS the same strategy would work with Ubuntu, Debian, or just about any other flavor of Linux.

Windows 10 is getting a Microsoft-built Linux kernel | ZDNet

Windows 10 is getting a Microsoft-built Linux kernel | ZDNet https://www.zdnet.com/article/windows-10-is-getting-a-microsoft-built-linux-kernel/

Podman and user namespaces: A marriage made in heaven | Opensource.com

User namespace allows you to specify a user identifier (UID) and group identifier (GID) mapping to run your containers. This means you can run as UID 0 inside the container and UID 100000 outside the container. If your container processes escape the container, the kernel will treat them as UID 100000. Not only that, but any file object owned by a UID that isn’t mapped into the user namespace will be treated as owned by “nobody” (65534, kernel.overflowuid), and the container process will not be allowed access unless the object is accessible by “other” (world readable/writable).

Podman and user namespaces: A marriage made in heaven | Opensource.com https://opensource.com/article/18/12/podman-and-user-namespaces

LXD 3.8 has been released – News – Linux Containers Forum

LXD 3.8 has been released – News – Linux Containers Forum https://discuss.linuxcontainers.org/t/lxd-3-8-has-been-released/3450