Learn all about Linode, including product videos, our company culture, data centers, and much more.
This video will give you an overview of the top-level directories found on most Linux systems. We'll go over how some of the common top-level directories are used, and explain their specific purposes within Linux.
In Linux, the top command is used to view a server’s processor activity in real-time. The htop command is an alternative to top, offering an easier interface featuring color, mouse operation, the ability to scroll through processes. In this video, we'll show how htop is overall more intuitive, although providing similar output as the regular top command.
In this part of our Hackersploit Security Series we will cover Linux Defense Evasion techniques. We will be taking a look at libprocesshider, and other methods of evading attacks.
In this video, we'll explain Linode’s GPU instances. Scientists, artists, and engineers need access to significant parallel computational power. Linode offers GPU-optimized virtual machines accelerated by the NVIDIA Quadro RTX 6000, harnessing the power of CUDA, Tensor, and RT cores to execute complex processing, deep learning, and ray tracing workloads.
Cockpit gives you a GUI for your server, which can be accessed via a web browser. Cockpit makes it easy to start containers, administer storage, configure networks, inspect logs, and perform system tasks with a mouse. You can think of Cockpit like a graphical “desktop interface”, but for individual servers.
In this video in our Hackersploit Red Team series, we will cover Linux Persistence Techniques. This is a method of establishing and maintaining access to a remote server using back door or web shell.
In this video, we'll install Uptime Kuma on a Linode server. Uptime Kuma is an open source monitoring tool. It enables you to monitor services over HTTP/S, TCP, DNS, and other protocols. You can receive notification alerts of downtime and even create custom status pages for your users.
In this video, we'll show you 3 ways to copy files from your local computer to a Linux server using scp, sshfs, and Filezilla.
In this video in our Hackersploit Red Team Series, we will cover Linux privilege escalation techniques. This includes obtaining root access, and exploiting permissions or binaries to achieve access.
In this video, instructor Jose Portilla shows how to deploy a Django application to a Linode server. This excerpt is part of Jose's full course available on Udemy. You can get a discount for the course at the following link https://www.udemy.com/course/django-and-python-full-stack-developer-masterclass/?couponCode=LINODE_YOUTUBE
In the eighth video in our series on Red Team Techniques, we will talk about Privilege Escalation Techniques in Windows. We will cover how to bypass UAC and use both Kernel and Token Impersonation Exploits.