btop is a modern resource monitor with a beautiful TUI interface. Installation, configuration, comparison with htop, and practical tips.
Volatility 3 — Linux Memory Dump Analysis Guide
Volatility 3 — the rewritten RAM analysis framework. No more profiles, new linux.* plugin syntax, installation, and a practical incident analysis example.
Volatility — Linux RAM Forensics and Analysis
Introduction to Volatility — a framework for analyzing RAM dumps. Profiles, plugins, and a practical example of analyzing a compromised Linux server.
Wazuh SIEM on Linux — Security Monitoring Guide
What is Wazuh and how to use it for Linux server security monitoring. FIM, vulnerability detection, log analysis, Active Response, and Suricata integration.
Suricata IDS/IPS — Network Threat Detection on Linux
What is Suricata and how it works as a next-generation IDS/IPS engine. Installation, rule configuration, and operating modes — passive (IDS) and inline (IPS).
LKRG — Linux Kernel Runtime Protection
How LKRG (Linux Kernel Runtime Guard) works — a kernel module protecting against rootkits and privilege escalation exploits. Installation and comparison with Grsecurity.
Ftrace — Tracing Linux Kernel Functions Step by Step
How to use ftrace and trace-cmd to trace function calls inside the Linux kernel. Configuration, usage examples, and performance diagnostics.
dmesg Command in Linux — How to Read Kernel Logs
How to use the dmesg command to diagnose hardware, driver, and boot issues in Linux. Practical examples of filtering and analyzing kernel log messages.
Strace in Linux — How to Trace System Calls
How to use strace to trace system calls of processes in Linux. Attaching to running processes, filtering, and practical debugging examples.
5 Best Linux Performance Monitoring Tools
A review of the 5 essential Linux performance monitoring tools: top, htop, vmstat, iostat, and ss. How to read CPU, memory, disk, and network metrics.