Learn how to configure non-root serial port access.
Baeldung Author
Guilherme Chehab
20+ years of experience managing IT teams. Tech & open-source aficionado.
Here's what I've written (so far):
Baeldung on Linux
- All
- Networking (4)
- Security (1)
- Scripting (1)
- Filesystems (1)
Run and Update Linux Behind Proxy Servers
Filed under Networking
Learn how to run and update Linux behind proxy servers.
Mount Files Systems Without Root Privileges
Filed under Filesystems
Explore some of the techniques to allow non-root users to mount file systems.
Linux TCP/IP Connections Limit
Filed under Networking
Learn about the limits on the number of concurrent TCP connections, how they work, and how to tune our servers for specific workloads.
Multiple DHCP Servers on the Network
Filed under Networking
Learn how to have multiple DHCP servers on the network.
Limit SSH Access to Specific Clients by Address
Filed under Security
Learn strategies to secure our servers’ administrative services.
Segmentation Fault in Linux
Filed under Scripting
Learn all about the segmentation fault – what it is, what causes it and how you can prevent it.
Baeldung on Computer Science
- All
- Security (11)
- Networking (7)
- Software Architecture (3)
- Programming (1)
Information Security Incident and Event Management
Filed under Networking, Security
Learn the main concepts of the SIEM process and review the tools for dealing with this critical part of our information security.
Advanced Persistent Threats
Filed under Security
Discover advanced persistent threats, their types, and known actors. Also learn some measures to increase resilience against APTs.
Introduction to Storage for Data Centers
Filed under Networking
Learn about the various types of data storage used for professional computing.
Introducing Backup Policies
Filed under Security
Learn about backup, its types, strategies, and policies.
What Is an ORM? How Does It Work? How Should We Use One?
Filed under Programming, Software Architecture
Learn what Object-Relational Mapping tools are, what they do, how they work, and why to use one.
Introduction to Web Proxies
Filed under Networking
Learn more about Web Proxies.
Should We Deploy Database and Web Server Apart?
Filed under Software Architecture
Learn some database and web server deployment tips and good practices.
Phishing Attacks
Filed under Security
Learn about phishing attacks and how to prevent them.
Vulnerability Assessment and Penetration Testing
Filed under Security
Learn about cybersecurity, vulnerability assessment and penetration testing.
What Are File Path Transversal Attacks?
Filed under Security
Learn about file path transversal attacks and their mitigation.
Does Code Obfuscation Bring Security Benefits?
Filed under Security
Learn about the security benefits that code obfuscation brings.
What Are Zero-Day Attacks?
Filed under Networking, Security
Learn what are zero-day attacks and what we can to do mitigate them.
Computer Clusters, Types, Uses and Applications
Filed under Software Architecture
Learn about computer clusters, their types, use cases, and applications.
Simulating Slow Internet and Network Errors
Filed under Networking, Security
Learn how we can simulate network conditions and some of the tools that we might use
What Is SQL Injection?
Filed under Security
Learn about SQL Injection and the main techniques to mitigate hackers attacks.
TCP Checksum Errors: Issues and Workarounds
Filed under Networking
In this tutorial, we’ll explore those questions and discuss some ways to improve our TCP relying systems robustness with better error detection or even correction.
What Is the Difference Between Active and Passive FTP?
Filed under Networking
In this tutorial, we’ll discuss how FTP operates, detailing the difference between active and passive operating modes.
Are HTTPS URLs Encrypted?
Filed under Security
Learn more about HTTPS URLs.