Kodachi – the OS for those who value privacy but don't want to learn Linux
Subscription | Read Online | Twitter Facebook LinkedIn

How to test if your Linux server is vulnerable to Log4j

Log4j is a serious vulnerability that has swept across the IT landscape quickly. Here's a single command you can run to test and see if you have any vulnerable packages installed.

Additional TechRepublic resources

Log4j vulnerability: Why your hot take on it is wrong

Kodachi is the operating system for those who value privacy but don't want to learn Linux

CI/CD platforms: How to choose the right continuous integration and delivery system for your business

How to manage a remote host via Cockpit

How to install Qubes OS as a virtual machine

How to install Nextcloud Hub II with Nextcloud Office

How to back up and restore MySQL/MariaDB data for a website

How to install the ConfigServer and Security Firewall combo on Ubuntu Server

Today's recommended downloads

Automate Tasks in Excel & Handle Data Like a Certified Pro

(TechRepublic Academy)

Oracle Linux checklist: What to do after installation

(TechRepublic Premium)

Strengthen your cybersecurity training and incident response plans with these 4 policies

(TechRepublic Premium)

Become an Ethical Hacker Bonus Bundle

(TechRepublic Academy)

End-of-the-year tools for managers

(TechRepublic Premium)

TechRepublic Premium

Best practices for successful managed service providers

Managed service providers (MSPs) face many unique challenges daily. TechRepublic Premium's MSP Best Practices series can help you face those challenges head-on.

Connect with TechRepublic

Visit the Subscription Center to get other free newsletters, manage your account settings or to be removed from TechRepublic communications.

Unsubscribe | FAQ | Terms of Use | Privacy Policy

© 2021 TechnologyAdvice, LLC. All rights reserved. All rights reserved.

This is a marketing email from TechnologyAdvice, 3343 Perimeter Hill Dr., Suite 100, Nashville, TN 37211, USA. Please do not reply to this message. To contact us, please click here.