Skip to Content

After more than five months since the release of version 3.4, OpenSSL 3.5 is here—and it’s packed with significant cryptographic advancements. What’s changed under the hood? How does it impact your applications? Should you upgrade now or wait? I’ll walk you through everything you need to know—from new post-quantum cryptography support and TLS enhancements to …

Read More about What’s Inside OpenSSL 3.5? The Crypto World Just Got a Major Upgrade

Today marks a major milestone for Debian and Ubuntu users: APT 3.0 has officially been released! This is the latest evolution of the powerful package manager used by millions to install and manage software on their systems. The new version kicks off a fresh stable series and is dedicated to Steve Langasek, a longtime contributor …

Read More about APT 3.0: A Big Step Forward for Debian and Ubuntu’s Core Package Tool

If you’re still using ifconfig, stop. This command was officially deprecated in Linux kernel 2.4 — way back in 2001. When it comes to managing network configurations in Linux today, two popular tools stand out: ip and nmcli. Both are powerful, but they serve different purposes and are used in different scenarios. Picking the wrong …

Read More about IP Command or nmcli? Which One Should You Use for Linux Networking?

cURL is a powerful command-line tool for transferring data with URLs. It supports numerous protocols including HTTP, HTTPS, FTP, and many more. Let’s explore 20 essential tips that will help you become proficient with cURL. 1. Basic GET Request The simplest way to use cURL is to fetch a webpage: curl https://example.com Use case: Quickly …

Read More about Mastering cURL: 20 Essential Tips for Beginners

Christoph Hellwig Steps Down From One Of His Kernel Roles Following Rust Drama Christoph Hellwig, a long-standing and highly respected Linux kernel developer, has stepped down from his role as maintainer of the DMA mapping subsystem. This decision follows recent debates concerning the integration of Rust programming language bindings into the Linux kernel’s DMA mapping helpers, …

Read More about Christoph Hellwig Steps Down From One Of His Kernel Roles Following Rust Drama

As a Linux system engineer, I’m sure you’ve all used the top command. It’s been the go-to tool for decades—simple, reliable, and always there when you need it. But have you ever noticed one thing? Occasionally, you might spot a process with CPU usage skyrocketing to 150%, 200%, or even 400%! Surprised? So what’s going …

Read More about  If Your CPU Usage is Over 100%, Read This Before Freaking Out!

If you’re a Linux user, chances are you’ve used top to check your system’s performance. It’s been the go-to tool for decades—simple, reliable, and always there when you need it. But let’s face it: top feels like a flip phone in the age of smartphones. It works, but there’s something better out there. If you’re …

Read More about Still Using top to Monitor Linux Performance? Discover Better Tools!

Secure Shell (SSH) is a powerful and widely used protocol that enables secure communication over a network. Whether you’re managing servers, deploying code, transferring files, or running remote applications, SSH is an essential tool for every IT professional and developer. While the basic ssh [email protected] command is familiar to many, SSH offers a wide array …

Read More about Work Smarter, Not Harder: Advanced SSH Techniques to Save Time and Effort

What is SSH and How Does It Work? SSH (Secure Shell) is a powerful tool that lets you securely connect to another computer over a network. Imagine you have a computer in the moon and need to access a server in another city or country. Instead of physically going there, SSH allows you to control …

Read More about Using SSH Every Day? Explore Advanced Features to Simplify Your Routine

If you’re running a Linux instance and suspect that the bandwidth is being overused, you can use a few tools to investigate what’s causing the high traffic. Tools like SAR, iftop, and NetHogs can help you identify the processes responsible for the load and take action to fix the issue. Common Scenarios High bandwidth usage: …

Read More about How to Track and Fix High Network Traffic on Your Linux Instance