<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Ubuntu Tutorials</title>
	<atom:link href="https://ubuntu-tutorials.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://ubuntu-tutorials.com</link>
	<description>Enhancing your Ubuntu experience!</description>
	<lastBuildDate>Wed, 29 Jan 2020 03:27:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Presenting Bastille at SCaLE18x</title>
		<link>https://ubuntu-tutorials.com/2020/01/28/presenting-bastille-at-scale18x/</link>
		
		<dc:creator><![CDATA[Christer Edwards]]></dc:creator>
		<pubDate>Wed, 29 Jan 2020 03:27:22 +0000</pubDate>
				<category><![CDATA[Community]]></category>
		<category><![CDATA[virtualization]]></category>
		<category><![CDATA[freebsd]]></category>
		<category><![CDATA[scale18x]]></category>
		<guid isPermaLink="false">http://ubuntu-tutorials.com/?p=2867</guid>

					<description><![CDATA[I am excited to announce that I will be presenting &#8220;Bastille: Secure Container Automation&#8221; at SCaLE18x in Pasadena, CA. This presentation will demonstrate container automation on FreeBSD using Bastille. Bastille is an open-source system for automating deployment and management of containerized applications on FreeBSD. Bastille automates deployment and management of containers using a container technology… <span class="read-more"><a href="https://ubuntu-tutorials.com/2020/01/28/presenting-bastille-at-scale18x/">Read More &#187;</a></span>]]></description>
										<content:encoded><![CDATA[
<p>I am excited to announce that I will be presenting &#8220;<a href="https://www.socallinuxexpo.org/scale/18x/presentations/bastille-secure-container-automation-freebsd">Bastille: Secure Container Automation</a>&#8221; at <a href="https://www.socallinuxexpo.org/scale/18x">SCaLE18x</a> in Pasadena, CA. This presentation will demonstrate container automation on FreeBSD using Bastille.</p>



<p><a href="https://bastillebsd.org">Bastille</a> is an open-source system for automating deployment and management of containerized applications on FreeBSD.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>Bastille automates deployment and management of containers using a container technology *old enough to buy you a drink! We&#8217;ve taken automation concepts learned from leading config management contenders and combined them with the ORIGINAL container technology. FreeBSD introduced containers in April 1999, pre-dating every other container technology available. Imagine, a reliable container technology that has had two decades to work out bugs. Talk about production ready! This talk will outline design features and demonstrate secure container automation in the cloud and on the Raspberry Pi.</p><cite>* Bastille uses <a href="https://bastillebsd.org">FreeBSD Jails</a> as the container platform.</cite></blockquote>



<p>To learn more about lightweight containers on FreeBSD visit <a href="https://bastillebsd.org">BastilleBSD</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DenyHosts Synchronization Mode</title>
		<link>https://ubuntu-tutorials.com/2013/12/01/denyhosts-synchronization-mode/</link>
		
		<dc:creator><![CDATA[Christer Edwards]]></dc:creator>
		<pubDate>Sun, 01 Dec 2013 22:43:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://ubuntu-tutorials.com/?p=2803</guid>

					<description><![CDATA[I recently deployed a new server to host this and my other websites. Because this is a public facing server, part of this deployment includes securing the network. To secure SSH I generally limit the users that are allowed to login to the system using AllowUsers directive, disallow root login using PermitRootLogin no and often change… <span class="read-more"><a href="https://ubuntu-tutorials.com/2013/12/01/denyhosts-synchronization-mode/">Read More &#187;</a></span>]]></description>
										<content:encoded><![CDATA[<div id="attachment_2805" style="width: 310px" class="wp-caption alignleft"><img decoding="async" aria-describedby="caption-attachment-2805" class="wp-image-2805 size-medium" src="http://ubuntu-tutorials.com/wp-content/uploads/2013/12/denyhosts-300x63.png" alt="Enable denyhosts synchronization mode (denyhosts logo)" width="300" height="63" srcset="https://ubuntu-tutorials.com/wp-content/uploads/2013/12/denyhosts-300x63.png 300w, https://ubuntu-tutorials.com/wp-content/uploads/2013/12/denyhosts.png 347w" sizes="(max-width: 300px) 100vw, 300px" /><p id="caption-attachment-2805" class="wp-caption-text">Enable denyhosts synchronization mode (denyhosts logo)</p></div>
<p style="text-align: right;">I recently deployed a new server to host this and my other websites. Because this is a public facing server, part of this deployment includes <a href="https://ubuntu-tutorials.com/2007/09/02/network-security-with-tcpwrappers-hostsallow-and-hostsdeny/">securing the network</a>. To secure SSH I generally limit the users that are allowed to login to the system using <em>AllowUsers</em> directive, disallow root login using <em>PermitRootLogin no</em> and often change the listening port. In addition to all this I also usually deploy the <em>denyhosts</em> service, which watches for brute-force attempts and blocks connections from those IPs. With this last deployment I learned about a new (to me) feature of denyhosts called <em>Synchronization Mode</em>. This setting allows your <em>denyhosts</em> installation to send and/or receive IPs blocked in brute-force attempts. This means your denyhosts installation can benefit from the shared blocklists of other hosts. In this tutorial I&#8217;ll outline the few steps needed to enable denyhosts Synchronization Mode.</p>
<h2><strong>Install denyhosts:</strong></h2>
<p>First, if you don&#8217;t yet have denyhosts installed, it can be added by installing the denyhosts package:</p>
<blockquote>
<p><code>sudo apt-get install denyhosts</code></p>
</blockquote>
<p>From the denyhosts FAQ:</p>
<blockquote>
<p>DenyHosts v2.0 and later introduces <i>synchronization mode</i> which allows DenyHosts daemons the ability to transmit denied host data to a central remote server (hosted by denyhosts.net). Additionally, DenyHosts daemons can also receive data that other DenyHosts daemons have sent to the central server.</p>
<p>This feature is intended to provide the ability to proactively deny ip addresses that have attacked other users of DenyHosts. That is, each DenyHosts 2.0 (or later) user can benefit from other users of Denyhosts. Similarly each DenyHosts user can benefit other DenyHosts users.</p>
</blockquote>
<h2><strong>Enable denyhosts synchronization mode:</strong></h2>
<p>By default this option is disabled. Enable it by un-commenting the following in the config file, <code>/etc/denyhosts.conf</code>:</p>
<blockquote>
<p><code>SYNC_SERVER = http://xmlrpc.denyhosts.net:9911</code></p>
</blockquote>
<h3><strong>Optional Settings:</strong></h3>
<p>Denyhosts Synchronization Mode is configurable. To only provide data to the collective toggle the SYNC_DOWNLOAD option from <em>yes</em> to <em>no</em> as seen here:</p>
<blockquote>
<p><code>SYNC_DOWNLOAD = no</code></p>
</blockquote>
<p>On the flip side, to only receive data you can toggle the SYNC_UPLOAD option from <em>yes</em> to <em>no</em> as seen below:</p>
<blockquote>
<p><code>SYNC_UPLOAD = no</code></p>
</blockquote>
<h3><strong>Restart denyhosts:</strong></h3>
<p>Once you&#8217;ve made these changes you&#8217;ll need to restart your denyhosts service:</p>
<blockquote>
<p><code>service denyhosts restart</code></p>
</blockquote>
<p>You can tail the denyhosts log to see that you are receiving updated blocklists. By default these lists are shared each hour.</p>


<blockquote class="wp-block-quote is-style-large is-layout-flow wp-block-quote-is-layout-flow"><p><em>Run denyhosts inside ssh enabled containers with <a href="https://bastillebsd.org">BastilleBSD</a>: Secure container automation.</em></p></blockquote>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Configure Automatic Updates : Ubuntu Server</title>
		<link>https://ubuntu-tutorials.com/2013/11/29/configure-automatic-updates-ubuntu-server/</link>
					<comments>https://ubuntu-tutorials.com/2013/11/29/configure-automatic-updates-ubuntu-server/#comments</comments>
		
		<dc:creator><![CDATA[Christer Edwards]]></dc:creator>
		<pubDate>Fri, 29 Nov 2013 18:46:57 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Upgrade]]></category>
		<guid isPermaLink="false">http://ubuntu-tutorials.com/?p=2796</guid>

					<description><![CDATA[Configure Automatic Updates : Ubuntu Server Ubuntu Server allows you to activate automatic updates during the initial installation process. This setting configures your system to automatically download and install security updates. This system is configurable and this tutorial will outline how to enable it if you hadn&#8217;t previously, disable it if you no longer want… <span class="read-more"><a href="https://ubuntu-tutorials.com/2013/11/29/configure-automatic-updates-ubuntu-server/">Read More &#187;</a></span>]]></description>
										<content:encoded><![CDATA[<h2><img fetchpriority="high" decoding="async" class="alignright size-medium wp-image-2800" alt="" src="http://ubuntu-tutorials.com/wp-content/uploads/2013/11/Ubuntu_Update_manager_icon_v2_by_myc1034-300x300.png" width="300" height="300" srcset="https://ubuntu-tutorials.com/wp-content/uploads/2013/11/Ubuntu_Update_manager_icon_v2_by_myc1034-300x300.png 300w, https://ubuntu-tutorials.com/wp-content/uploads/2013/11/Ubuntu_Update_manager_icon_v2_by_myc1034-150x150.png 150w, https://ubuntu-tutorials.com/wp-content/uploads/2013/11/Ubuntu_Update_manager_icon_v2_by_myc1034.png 512w" sizes="(max-width: 300px) 100vw, 300px" />Configure Automatic Updates : Ubuntu Server</h2>
<p>Ubuntu Server allows you to activate automatic updates during the initial installation process. This setting configures your system to automatically download and install security updates. This system is configurable and this tutorial will outline how to enable it if you hadn&#8217;t previously, disable it if you no longer want to use it, and select the repositories from which you want to receive updates.</p>
<p>To enable automatic updates on your system you need to ensure you have the <code>unattended-upgrades</code> package installed. This can be done using the following command:</p>
<blockquote><p><code>sudo apt-get install unattended-upgrades</code></p></blockquote>
<p>This will install a config file that you can tweak found at <code>/etc/apt/apt.conf.d/50unattended-upgrades</code>. This file allows you to configure the repositories you want to receive updates from, packages you want to blacklist from automatic updating, and even an email address where you&#8217;d like to be notified of updates.</p>
<h3>Configure Automatic Updates</h3>
<p>Using your favorite editor, open <code>/etc/apt/apt.conf.d/50unattended-upgrades</code> and update the first section <em>Allowed-Origins</em> as seen in the example below:</p>
<blockquote><p><code>// Automatically upgrade packages from these (origin:archive) paris<br />
Unattended-Upgrade::Allowed-Origins {<br />
"${distro_id}:${distro_codename}-security";<br />
//  "${distro_id}:${distro_codename}-updates";<br />
//  "${distro_id}:${distro_codename}-proposed";<br />
//  "${distro_id}:${distro_codename}-backports";<br />
};<br />
</code></p></blockquote>
<p>If you&#8217;d like to receive updates from the updates, proposed or backports repositories, simply uncomment those lines and save.</p>
<p>The <em>Package-Blocklist</em> section is just below. If you have any packages that you do NOT want automatically updated, list them here.</p>
<blockquote><p><code>// List of packages to not update<br />
Unattended-Upgrade::Package-Blacklist {<br />
//    "vim";<br />
//    "libc6";<br />
//    "libc6-dev";<br />
//    "libc6-i686";<br />
};<br />
</code></p></blockquote>
<p>There are quite a few more options in this file. They are well documented, so I&#8217;ll leave it to you to determine if the options are right for you.</p>
<h3><span style="font-size: 1.17em;">Enable / Disable Automatic Updates</span></h3>
<p>To enable (or disable) the automatic updates you&#8217;ll finally need to edit the <code>/etc/apt/apt.conf.d/10periodic</code> file and make it look like the example here:</p>
<blockquote><p><code>APT::Periodic::Update-Package-Lists "1";<br />
APT::Periodic::Download-Upgradeable-Packages "1";<br />
APT::Periodic::AutocleanInterval "7";<br />
APT::Periodic::Unattended-Upgrade "1";<br />
</code></p></blockquote>
<p>Finally, to disable automatic updates change the &#8220;1&#8221;s in the file above to &#8220;0&#8221;.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://ubuntu-tutorials.com/2013/11/29/configure-automatic-updates-ubuntu-server/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Tunnel SSH over SSL</title>
		<link>https://ubuntu-tutorials.com/2013/11/27/tunnel-ssh-over-ssl/</link>
		
		<dc:creator><![CDATA[Christer Edwards]]></dc:creator>
		<pubDate>Thu, 28 Nov 2013 04:07:35 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://ubuntu-tutorials.com/?p=2785</guid>

					<description><![CDATA[Tunnel SSH over SSL Have you ever found yourself behind a restrictive firewall that only allows outbound http(s) traffic, but you need to SSH out? Perhaps you&#8217;ve tried running SSH on port 443 (https) but those connections have been denied as well. In this post I&#8217;ll outline how to configure stunnel on an SSH server… <span class="read-more"><a href="https://ubuntu-tutorials.com/2013/11/27/tunnel-ssh-over-ssl/">Read More &#187;</a></span>]]></description>
										<content:encoded><![CDATA[<h2>Tunnel SSH over SSL</h2>
<p><img decoding="async" class="alignright" style="margin: 2px; border: 2px solid black;" alt="" src="https://upload.wikimedia.org/wikipedia/en/6/65/OpenSSH_logo.png" width="194" height="191" /></p>
<p>Have you ever found yourself behind a restrictive firewall that only allows outbound http(s) traffic, but you need to SSH out? Perhaps you&#8217;ve tried running SSH on port 443 (https) but those connections have been denied as well. In this post I&#8217;ll outline how to configure stunnel on an SSH server to allow encrypted SSH connections over port 443 (https).</p>
<p>This configuration is done in two parts. The first half is done on the remote SSH server. The second half is done on the local machine. In this case I&#8217;m running Ubuntu Server and Ubuntu Desktop for the client.</p>
<p><strong>Server Side Instructions:</strong></p>
<p>First off we&#8217;ll need to install the stunnel package:</p>
<blockquote><p><code>sudo apt-get install stunnel4</code></p></blockquote>
<p>Once the package is installed we&#8217;ll need to configure stunnel with an SSL certificate and a config file. First, the SSL certificate:</p>
<blockquote><p><code>openssl genrsa 1024 &gt; stunnel.key<br />
openssl req -new -key stunnel.key -x509 -days 1000 -out stunnel.crt<br />
cat stunnel.crt stunnel.key &gt; stunnel.pem<br />
sudo mv stunnel.pem /etc/stunnel/</code></p></blockquote>
<p><strong>Configure stunnel to tunnel 443 (https) to 22 (ssh):</strong></p>
<p>By default stunnel doesn&#8217;t provide any config files. We&#8217;ll create a simple config file to meet the needs of using SSH over SSL. Create a new file, <code>/etc/stunnel/stunnel.conf</code> and copy in the contents below:</p>
<blockquote><p><code>pid = /var/run/stunnel.pid<br />
cert = /etc/stunnel/stunnel.pem<br />
</code></p>
<p>[ssh]<br />
accept = public_ip:443<br />
connect = 127.0.0.1:22</p></blockquote>
<p>The above configuration tells stunnel where to find the certificate we generated and where to accept and forward connections. In this case stunnel will listen on the public_ip on port 443 (https) and redirect connections there back to localhost on 22 (ssh).</p>
<p>In order to start the stunnel service we&#8217;ll need to activate it in <code>/etc/default/stunnel4</code>. Change the ENABLED line from 0 to 1.</p>
<p>Finally, we can start the service and move on to the client configuration:</p>
<blockquote><p><code>sudo service stunnel4 start</code></p></blockquote>
<p>You can verify that stunnel is now listening by using the netstat command:</p>
<blockquote><p><code>netstat -natp | grep :443</code></p></blockquote>
<p><strong>Client Side Instructions:</strong></p>
<p>The rest of these instructions are done on the local machine.</p>
<p>As was done on the server, we&#8217;ll need to install the stunnel package:</p>
<blockquote><p><code>sudo apt-get install stunnel4</code></p></blockquote>
<p>The client configuration also needs the same SSL certificate that we generated above. copy/paste or otherwise duplicate the <code>.pem</code> file we generated in the Server Side Instructions and save it to the same location, <code>/etc/stunnel/stunnel.pem</code>.</p>
<p>We&#8217;ll need to create a similar configuration file, only this time we&#8217;ll change the accept and connect sections. Use the example below to populate the <code>/etc/stunnel/stunnel.conf</code> on your client.</p>
<blockquote><p><code>pid = /var/run/stunnel.pid<br />
cert = /etc/stunnel/stunnel.pem</code></p>
<p>[ssh]<br />
accept = 127.0.0.1:2200<br />
connect = remote_ip:443</p></blockquote>
<p>With the config file and certificate in place we&#8217;re ready to enable stunnel and start the service. Enable the service (as above) in the <code>/etc/default/stunnel4</code> and then start the service.</p>
<blockquote><p><code>sudo service stunnel4 start</code></p></blockquote>
<p><strong>Make the connection</strong></p>
<p>With the stunnel service now running on both the server and the client we&#8217;re ready to make the secure connection. Now when you connect to your local machine on port 2200 it will make a connection to the remote IP on port 443, create a secure SSL connection, and connect to port 22 on the other end. Your encrypted SSH connections are now wrapped in an encrypted SSL connection using port 443.</p>
<blockquote><p><code>ssh localhost -p 2200</code></p></blockquote>
<p><strong>Conclusion</strong></p>
<p>stunnel can be used to encrypt a wide range of services. In this case creating an SSL connection over the standard https port allows you to SSH out even when the standard SSH port is blocked. This configuration will become part of my standard setup on my SSH servers. You never know when you&#8217;ll find yourself in a situation where you&#8217;ll need this kind of access!</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Win a Free Copy of Instant Ubuntu</title>
		<link>https://ubuntu-tutorials.com/2013/10/29/win-free-copy-instant-ubuntu/</link>
					<comments>https://ubuntu-tutorials.com/2013/10/29/win-free-copy-instant-ubuntu/#comments</comments>
		
		<dc:creator><![CDATA[Christer Edwards]]></dc:creator>
		<pubDate>Tue, 29 Oct 2013 14:26:20 +0000</pubDate>
				<category><![CDATA[Beginner]]></category>
		<guid isPermaLink="false">http://ubuntu-tutorials.com/?p=2778</guid>

					<description><![CDATA[By now you&#8217;ve probably heard about my new book, Instant Ubuntu. If you haven&#8217;t yet picked up a copy, you&#8217;ll be happy to hear that I&#8217;ve teamed up with Packt Publishing to organize a giveaway! Three lucky winners stand a chance to win a copy of the eBook. Keep reading to find out how you… <span class="read-more"><a href="https://ubuntu-tutorials.com/2013/10/29/win-free-copy-instant-ubuntu/">Read More &#187;</a></span>]]></description>
										<content:encoded><![CDATA[<p>By now you&#8217;ve probably heard about my new book, <a title="Complete guide to making the switch to Ubuntu" href="http://www.packtpub.com/complete-guide-to-making-the-switch-to-ubuntu/book" target="_blank">Instant Ubuntu</a>. If you haven&#8217;t yet picked up a copy, you&#8217;ll be happy to hear that I&#8217;ve teamed up with Packt Publishing to organize a giveaway! Three lucky winners stand a chance to win a copy of the eBook. Keep reading to find out how you can win a free copy!</p>
<p><div id="attachment_2703" style="width: 184px" class="wp-caption alignleft"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-2703" alt="Instant Ubuntu" src="http://ubuntu-tutorials.com/wp-content/uploads/2013/10/0872OS_cov.png" width="174" height="213" /><p id="caption-attachment-2703" class="wp-caption-text">Instant Ubuntu</p></div></p>
<h2>Instant Ubuntu &#8211; Overview</h2>
<ul>
<li>Download and burn the free Ubuntu installer DVD</li>
<li>Connect with friends and family online using popular social media platforms, email, and chat</li>
<li>Use the Ubuntu Software Center and install new applications</li>
<li>Explore the included multimedia applications, and play music and watch videos</li>
<li>Set up automatic backups stored securely in the Ubuntu One cloud</li>
<li>Be productive at work or school with the LibreOffice productivity suite</li>
<li>Install up-to-date drivers to support cutting edge video and network hardware</li>
<li>Join a worldwide community of open source enthusiasts</li>
</ul>
<h2><span style="font-size: 1.5em;">How to Enter</span></h2>
<p>All you need to do to enter is head on over to the <a title="Complete guide to making the switch to Ubuntu" href="http://www.packtpub.com/complete-guide-to-making-the-switch-to-ubuntu/book" target="_blank">Instant Ubuntu</a> page at the Packt Publishing website, look through the product description and then leave a comment here to let us know what you find most interesting about the book. It&#8217;s that simple. We&#8217;ll then choose winners from the comments on this page and they&#8217;ll receive a free copy of the eBook!</p>
<p>Contest ends on <em>2013/11/05</em>, so act quickly! Winners will be contacted via email, so be sure to use a valid email address with your comment!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://ubuntu-tutorials.com/2013/10/29/win-free-copy-instant-ubuntu/feed/</wfw:commentRss>
			<slash:comments>11</slash:comments>
		
		
			</item>
		<item>
		<title>Find your Ubuntu kernel version</title>
		<link>https://ubuntu-tutorials.com/2013/10/03/find-ubuntu-kernel-version/</link>
					<comments>https://ubuntu-tutorials.com/2013/10/03/find-ubuntu-kernel-version/#comments</comments>
		
		<dc:creator><![CDATA[Christer Edwards]]></dc:creator>
		<pubDate>Thu, 03 Oct 2013 19:22:44 +0000</pubDate>
				<category><![CDATA[Ubuntu]]></category>
		<guid isPermaLink="false">http://ubuntu-tutorials.com/?p=2683</guid>

					<description><![CDATA[I&#8217;m often surprised at the obscure ways that people find my site through Google searches. Looking through my traffic statistics I find that one of the most popular methods used to find my blog is by searching for the term &#8220;ubuntu kernel version&#8221;. I would not have expected that to be a popular search term,… <span class="read-more"><a href="https://ubuntu-tutorials.com/2013/10/03/find-ubuntu-kernel-version/">Read More &#187;</a></span>]]></description>
										<content:encoded><![CDATA[<p>I&#8217;m often surprised at the obscure ways that people find my site through Google searches. Looking through my traffic statistics I find that one of the most popular methods used to find my blog is by searching for the term &#8220;ubuntu kernel version&#8221;. I would not have expected that to be a popular search term, but years after writing a post outlining methods to find your kernel version it still brings high traffic. This post is written as an update to the original post I wrote in <a title="kernel version" href="http://ubuntu-tutorials.com/2007/01/27/how-to-find-your-ubuntu-or-kernel-version/">way back in 2007</a>.</p>
<h2>Ubuntu kernel version</h2>
<p><img loading="lazy" decoding="async" class="size-full wp-image-2688 alignright" title="ubuntu kernel version" alt="uname" src="http://ubuntu-tutorials.com/wp-content/uploads/2013/10/uname.png" width="400" height="259" />The Linux kernel is a core component of every Ubuntu system. It is primarily responsible for managing the system hardware. Having the ability to check what version you are running can be beneficial. From time to time there are vulnerabilities that affect specific kernel versions, and being able to verify whether or not you are affected can be helpful. Certain features and hardware support are tied to certain kernel versions as well. This post will outline how to discover your Ubuntu kernel version in two easy steps.</p>
<p>Discovering your Ubuntu kernel version can be done in just a few quick steps. I&#8217;ll outline these steps below.</p>
<ol>
<li>Open a Terminal window (Dash | search &#8220;Terminal&#8221; | hit Enter)</li>
<li>Type the following command:</li>
</ol>
<pre class="toolbar:2 striped:false marking:false ranges:false nums:false nums-toggle:false wrap-toggle:false lang:sh decode:true crayon-selected">uname -r</pre>
<p>That&#8217;s it! The <em>uname</em> command can report information about the currently running kernel, including version, system hostname, system architecture and more. For more information see <em>man uname</em>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://ubuntu-tutorials.com/2013/10/03/find-ubuntu-kernel-version/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Instant Ubuntu Now Available</title>
		<link>https://ubuntu-tutorials.com/2013/10/01/instant-ubuntu-now-available/</link>
					<comments>https://ubuntu-tutorials.com/2013/10/01/instant-ubuntu-now-available/#comments</comments>
		
		<dc:creator><![CDATA[Christer Edwards]]></dc:creator>
		<pubDate>Wed, 02 Oct 2013 02:26:03 +0000</pubDate>
				<category><![CDATA[Beginner]]></category>
		<category><![CDATA[Installation]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Ubuntu]]></category>
		<guid isPermaLink="false">http://ubuntu-tutorials.com/?p=2668</guid>

					<description><![CDATA[I&#8217;m very happy to announce the availability of my new book, &#8220;Instant Ubuntu&#8220;! I spent most of the summer working on this and I&#8217;m very happy to finally see it published. This book is written for those brand-new to Ubuntu. The book includes step-by-step installation instructions, a tour of the Unity desktop and an outline… <span class="read-more"><a href="https://ubuntu-tutorials.com/2013/10/01/instant-ubuntu-now-available/">Read More &#187;</a></span>]]></description>
										<content:encoded><![CDATA[<p><div style="width: 184px" class="wp-caption alignleft"><a href="http://www.packtpub.com/complete-guide-to-making-the-switch-to-ubuntu/book#chapter_0"><img loading="lazy" decoding="async" alt="Instant Ubuntu" src="https://dgdsbygo8mp3h.cloudfront.net/sites/default/files/imagecache/productview_larger/0872OS_cov.jpg" width="174" height="213" /></a><p class="wp-caption-text">Instant Ubuntu</p></div></p>
<p>I&#8217;m very happy to announce the availability of my new book, &#8220;<a title="Instant Ubuntu" href="http://ubuntu-tutorials.com/instant-ubuntu/">Instant Ubuntu</a>&#8220;! I spent most of the summer working on this and I&#8217;m very happy to finally see it published. This book is written for those brand-new to Ubuntu. The book includes step-by-step installation instructions, a tour of the Unity desktop and an outline of the top features and applications. My hope is that it will be a useful tool for those making the switch from Windows.</p>
<p>Instant Ubuntu is your <a title="complete guide to making the switch to Ubuntu" href="http://www.packtpub.com/complete-guide-to-making-the-switch-to-ubuntu/book">complete guide to making the switch to Ubuntu</a>.</p>
<h2>What you will learn from this book</h2>
<ul>
<li>Download and burn the free Ubuntu installer DVD</li>
<li>Connect with friends and family online using popular social media platforms, email, and chat</li>
<li>Use the Ubuntu Software Center and install new applications</li>
<li>Explore the included multimedia applications, and play music and watch videos</li>
<li>Set up automatic backups stored securely in the Ubuntu One cloud</li>
<li>Be productive at work or school with the LibreOffice productivity suite</li>
<li>Install up-to-date drivers to support cutting edge video and network hardware</li>
<li>Join a worldwide community of open source enthusiasts</li>
</ul>
<div>
<h2>In Detail</h2>
<p>Ubuntu is widely considered the worlds’ most popular Linux distribution. Focusing on simplicity and ease of use, it provides an intuitive desktop environment suitable even for the novice user. Built by a worldwide team of developers, Ubuntu provides a welcoming approach to software.</p>
<p>[pullquote align=&#8221;right&#8221;]“Instant Ubuntu” will guide you through the steps required to begin using the Ubuntu Linux distribution on your desktop or laptop. This book provides a guided tour of the installation, followed by an overview of the desktop environment, and an introduction to all of the top applications.[/pullquote]</p>
<p>Starting out with detailed instructions on the installation, this book will walk you step-by-step through the basics of getting started. Once you’re up and running, you’ll be given a full tour of the Ubuntu Dash and Launcher, followed by an outline of the top applications and features.</p>
<div id="approach">
<div>
<h2>Approach</h2>
</div>
<p>Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. This title is a step-by-step guide to installing and using Ubuntu easily and quickly.</p>
</div>
<div id="audience">
<div>
<h2>Who this book is for</h2>
</div>
<p>If you are interested in exploring what Ubuntu Linux has to offer, this is the book for you. “<a title="Instant Ubuntu" href="http://ubuntu-tutorials.com/instant-ubuntu/">Instant Ubuntu</a>” is written from the standpoint of a beginner. All you need to get started with this book is a very basic understanding of computing, such as the ability to burn a DVD and navigate the Internet.</p>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://ubuntu-tutorials.com/2013/10/01/instant-ubuntu-now-available/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Announcing: Into The Salt Mine</title>
		<link>https://ubuntu-tutorials.com/2013/09/25/announcing-into-the-salt-mine/</link>
		
		<dc:creator><![CDATA[Christer Edwards]]></dc:creator>
		<pubDate>Wed, 25 Sep 2013 18:51:12 +0000</pubDate>
				<category><![CDATA[Ubuntu]]></category>
		<guid isPermaLink="false">http://ubuntu-tutorials.com/?p=1994</guid>

					<description><![CDATA[I&#8217;ve started a new blog that I&#8217;d like to announce called Into the Salt Mine. This blog will focus solely on using the suite of free software applications developed by Salt Stack. This includes configuration management, remote execution, cloud provisioning and more. The goal is to provide regular tips and updates on managing systems using Salt and… <span class="read-more"><a href="https://ubuntu-tutorials.com/2013/09/25/announcing-into-the-salt-mine/">Read More &#187;</a></span>]]></description>
										<content:encoded><![CDATA[<p>I&#8217;ve started a new blog that I&#8217;d like to announce called <a title="Into the Salt Mine" href="http://intothesaltmine.org">Into the Salt Mine</a>. This blog will focus solely on using the suite of free software applications developed by <a title="Salt Stack Inc" href="http://saltstack.com">Salt Stack</a>. This includes configuration management, remote execution, cloud provisioning and more. The goal is to provide regular tips and updates on managing systems using Salt and related tools.</p>
<p>If you haven&#8217;t heard of Salt yet, I&#8217;d highly recommend checking out the <a title="Salt 30 Second Summary" href="http://docs.saltstack.org/en/latest/topics/index.html">30 second summary</a> and consider using Salt to manage your systems.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Auto hide Unity Launcher in Ubuntu 12.04 &#8220;Precise Pangolin&#8221;</title>
		<link>https://ubuntu-tutorials.com/2013/03/04/auto-hide-unity-launcher-in-ubuntu-12-04-precise-pangolin/</link>
					<comments>https://ubuntu-tutorials.com/2013/03/04/auto-hide-unity-launcher-in-ubuntu-12-04-precise-pangolin/#comments</comments>
		
		<dc:creator><![CDATA[Christer Edwards]]></dc:creator>
		<pubDate>Tue, 05 Mar 2013 02:42:43 +0000</pubDate>
				<category><![CDATA[Ubuntu]]></category>
		<category><![CDATA[unity]]></category>
		<guid isPermaLink="false">http://ubuntu-tutorials.com/?p=2633</guid>

					<description><![CDATA[Well I&#8217;m almost a week into my return to Ubuntu and there are a few more tweaks that I&#8217;ve discovered I like to make. One of these is auto-hiding the Unity Launcher bar along the left side of the display. Perhaps it&#8217;s based on doing the same thing with my OS X installation on my… <span class="read-more"><a href="https://ubuntu-tutorials.com/2013/03/04/auto-hide-unity-launcher-in-ubuntu-12-04-precise-pangolin/">Read More &#187;</a></span>]]></description>
										<content:encoded><![CDATA[<p>Well I&#8217;m almost a week into my return to Ubuntu and there are a few more tweaks that I&#8217;ve discovered I like to make. One of these is auto-hiding the Unity Launcher bar along the left side of the display. Perhaps it&#8217;s based on doing the same thing with my OS X installation on my MacBook. Whatever the reason, this article will outline how to auto-hide the Unity Launcher in Ubuntu 12.04 &#8220;Precise Pangolin&#8221;.</p>
<p><strong>System Settings &gt; Appearance &gt; Behavior</strong></p>
<p><div id="attachment_2635" style="width: 310px" class="wp-caption alignleft"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-2635" class="size-medium wp-image-2635" alt="Auto Hide Unity Launcher" src="http://ubuntu-tutorials.com/wp-content/uploads/2013/03/auto-hide-unity-launcher-300x236.jpg" width="300" height="236" srcset="https://ubuntu-tutorials.com/wp-content/uploads/2013/03/auto-hide-unity-launcher-300x236.jpg 300w, https://ubuntu-tutorials.com/wp-content/uploads/2013/03/auto-hide-unity-launcher-624x491.jpg 624w, https://ubuntu-tutorials.com/wp-content/uploads/2013/03/auto-hide-unity-launcher.jpg 756w" sizes="(max-width: 300px) 100vw, 300px" /><p id="caption-attachment-2635" class="wp-caption-text">Appearance Settings</p></div></p>
<p>To customize the behavior of your Unity Launcher, navigate your way to the <em>System Settings</em> application and select &#8220;<em>Appearance</em>&#8220;. From there select the &#8220;<em>Behavior</em>&#8221; tab, and toggle the button on the right for the option &#8220;<em>Auto-hide the Launcher</em>&#8220;. You&#8217;re then able to customize the reveal location and reveal sensitivity.</p>
<p>To customize the reveal location you&#8217;re able to decide between the left-side of the screen or the top-left corner of the screen. I prefer the left-side personally. I&#8217;ve also left the reveal sensitivity at the default, but you may prefer to tune that to your preference.</p>
<p>You can always return the behavior to the default settings by selecting the &#8220;<em>Restore Default Behavior</em>&#8221; button.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://ubuntu-tutorials.com/2013/03/04/auto-hide-unity-launcher-in-ubuntu-12-04-precise-pangolin/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Install Salt Stack on Ubuntu LTS</title>
		<link>https://ubuntu-tutorials.com/2013/03/01/install-salt-stack-on-ubuntu-lts/</link>
		
		<dc:creator><![CDATA[Christer Edwards]]></dc:creator>
		<pubDate>Sat, 02 Mar 2013 02:57:43 +0000</pubDate>
				<category><![CDATA[configuration management]]></category>
		<guid isPermaLink="false">http://ubuntu-tutorials.com/?p=2010</guid>

					<description><![CDATA[As a system administrator I&#8217;m always on the lookout for new systems and tools to make my life easier. As the saying goes, &#8220;a good admin is a lazy admin.&#8221; Any day I can find a new tool to improve the efficiency in which I&#8217;m able to manage my machines is a good day. To… <span class="read-more"><a href="https://ubuntu-tutorials.com/2013/03/01/install-salt-stack-on-ubuntu-lts/">Read More &#187;</a></span>]]></description>
										<content:encoded><![CDATA[<p><div id="attachment_2728" style="width: 170px" class="wp-caption alignleft"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-2728" class="size-full wp-image-2728   " style="margin: 1px;" alt="SaltStack" src="http://ubuntu-tutorials.com/wp-content/uploads/2013/03/saltstack-logo.png" width="160" height="160" /><p id="caption-attachment-2728" class="wp-caption-text">SaltStack</p></div></p>
<p>As a system administrator I&#8217;m always on the lookout for new systems and tools to make my life easier. As the saying goes, &#8220;a good admin is a lazy admin.&#8221; Any day I can find a new tool to improve the efficiency in which I&#8217;m able to manage my machines is a good day. To date, my favorite tool for this is <a title="Salt Stack" href="http://saltstack.com">Salt Stack</a>. Remote execution. <a title="Configuration Management with Salt Stack" href="http://intothesaltmine.org/blog/html/2013/02/25/configuration_management_with_saltstack.html">Configuration management</a>. Easy syntax. Salt Stack is a great tool for managing any number of machines. In this post I wanted to outline how to <a title="Install Salt Stack on Ubuntu" href="http://intothesaltmine.org/blog/html/2013/02/24/install_salt_stack_on_ubuntu.html">install Salt Stack on Ubuntu LTS</a>.</p>
<p><strong>Installation</strong></p>
<p>The latest Salt Stack packages are available in a PPA. The steps below demonstrate how to add the PPA and install the Salt Stack packages.</p>
<pre class="toolbar:2 nums:false nums-toggle:false lang:sh decode:true">sudo apt-get install python-software-properties
sudo add-apt-repository -y ppa:saltstack/salt</pre>
<p>Once the repository has been configured you&#8217;ll need to refresh your package cache.</p>
<pre class="toolbar:2 nums:false nums-toggle:false lang:sh decode:true">sudo apt-get update</pre>
<p>Now you should be ready to install the Salt Stack packages. Salt Stack is broken up into three different packages: salt-master, salt-minion and salt-syndic.</p>
<p><strong>Salt Master</strong></p>
<pre class="toolbar:2 nums:false nums-toggle:false lang:sh decode:true">sudo apt-get install salt-master</pre>
<p><strong>Salt Minion</strong></p>
<pre class="toolbar:2 nums:false nums-toggle:false lang:sh decode:true crayon-selected">sudo apt-get install salt-minion</pre>
<p><strong>Salt Syndic</strong></p>
<pre class="toolbar:2 nums:false nums-toggle:false lang:sh decode:true">sudo apt-get install salt-syndic</pre>
<p>It&#8217;s likely that you&#8217;ll want one Salt Master and a number of Salt Minions. Salt Syndics are for slightly more advanced configurations.</p>
<p>For more information on using Salt Stack, you might be interested in following the <a title="Into The Salt Mine" href="http://intothesaltmine.org">Into The Salt Mine</a> blog.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
