BeginLinux Guru

BeginLinux Guru

Views:
564,000
Subscribers:
8,590
Videos:
140
Duration:
1:08:43:44
United States
United States

BeginLinux Guru is an American content creator on YouTube with at least 8.59 thousand subscribers, publishing 140 videos which altogether total approximately 564 thousand views.

Created on ● Channel Link: https://www.youtube.com/channel/UC88eard_2sz89an6unmlbeA





Top 100 Videos With The Longest Duration by BeginLinux Guru


Video TitleDurationCategoryGame
1.Revenge of the Red Hat Clones43:55
2.Red Hat Drama Keeps Getting Better and Better36:29
3.Getting Help for Linux35:09Let's Play
4.Red Hat Shoots Itself in the Foot Again34:52
5.Demystifying Ubuntu's Uncomplicated Firewall33:54
6.Linux user account configuration files33:00
7.Who Really Killed CentOS Linux?32:35
8.Should You Replace Red Hat, AlmaLinux, or Rocky Linux with Debian?32:29
9.The Linux find Command29:24
10.Docker Host Security29:03
11.Prevent Data Loss with RAID28:49
12.Backup Your Servers Properly, or Else!27:49
13.Install OpenSCAP with AlmaLinux 927:25
14.The Death of CentOS Linux27:00
15.Create Linux Partitions with fdisk25:54Tutorial
16.Linux and Unix File Permissions25:21
17.View Linux Processes with ps25:14
18.View Linux Processes with top24:47Tutorial
19.Create Your First Linux Logical Volume24:42Vlog
20.Linux Revives Ancient Computers!24:41
21.Create Linux user accounts on Red Hat Linux distros24:36
22.Ubuntu 17.04 released. Ubuntu drops Unity. Ubuntu focuses on enterprise.23:57
23.Schedule a Future Linux Job with at23:33Tutorial
24.Automatically mount Linux partitions with fstab23:31Tutorial
25.Basic Linux Commands23:05
26.AI-generated Crypto Scam Advertisements22:46
27.Demystifying firewalld22:45
28.User Management Utilities Common to All Linux Distros22:43
29.Virtual Private Networks aren't always so private22:26
30.Schedule Linux Jobs with cron22:19
31.The Linux Filesystem21:47
32.Mounting Linux Partitions with systemd21:34
33.Red Hat Appeases CentOS Users -- Kind of21:28
34.Upgrading to Fedora 2420:57
35.Hard Links and Symbolic Links20:45
36.International Bride Sites Exposed!20:40
37.View Linux Processes with htop18:56
38.Wordpress Security Vulnerabilities. Scan Wordpress for vulnerabilities.17:51
39.View Block Device Info with lsblk17:50
40.The FTX Crash and its Cybersecurity Lessons17:41
41.Is Linux Secure?17:30
42.Certified LPI Level 3 Enterprise Security17:12Let's Play
43.Set Linux Process Priorities with nice and renice17:12
44.Demystifying Linux cgroups17:10
45.Linux ransomware on desktops and servers16:41
46.The systemd Service File--The Service Section16:38
47.View System Information with inxi16:31Guide
48.Adobe kills Flash. Great news for Linux!16:29
49.Demystifying Linux CPU Load Averages16:23
50.View Disk Space Usage with Linux df Command16:20
51.I have been sextorted!16:06
52.Linux Processes and the proc File System15:49
53.Linux Signals and the Linux kill Command15:44Tutorial
54.View Hardware Info with lshw15:29
55.SambaCry. WannaCry for Linux?15:20
56.Start Network Services Dynamically15:15
57.Android Trojan redirects users, Slackware team finds libpng security bug15:13
58.Should we trust Microsoft in the Linux Foundation?15:05
59.Adding Third-Party Repositories to Fedora 2415:04
60.SSH Key Control14:58
61.Which Linux Distro for Beginners?14:30
62.Formatting and Mounting Linux Partitions14:30
63.Does Encryption Protect Your Cybersecurity?14:23
64.Linux Gaming--Battle for Wesnoth14:21Battle for Wesnoth
65.Adding User Accounts on Non-Red Hat Systems13:58Prompt
66."sudo" for Home Users13:40
67.systemd Basics Part 2 -- Daemon Management13:04
68.systemd Basics Part 1 covers the shutdown and reboot commands.13:01
69.Upgrade OpenSUSE Leap to OpenSUSE Tumbleweed Rolling Release12:51
70.Striped and Mirrored Logical Volumes12:47Vlog
71.The Linux locate command12:39
72.A Bogus Linux Vulnerability?12:28
73.Tizen Linux in Samsung televisions vulnerable to hacking12:21
74.Linux Crypto Mining Malware Sensationalism12:21
75.Create Linux Partititions with gdisk12:08
76.SambaCry plants Linux Cryptocurrency Mining Malware11:58
77.Is Open Source Software More Secure?11:51
78.YouTube Advertises a Scam11:50
79.The Sorry State of Cybersecurity11:41
80.Setting the hostname with systemd11:36
81.Linux Users are Doomed!11:24
82.Add a Drive to a Logical Volume11:14Vlog
83.SEC Does a Crypto Scam!11:06
84.Unlike Windows, Linux does not force you to update10:51Vlog
85.Kali Linux Refresh. Cloud GPUs for Password Cracking. New wireless drivers.10:49
86.systemd Basics Part 3 -- Targets vs. Runlevels10:43
87.systemd Security Flaw Can Allow Remote Code Execution Attacks10:32
88.Keep Linux Processes Running When You Log Out10:30Tutorial
89.Ubuntu Unity forks. Ubuntu 17.04 wireless bug. Ubuntu on Dell. Ubuntu and System 76.10:24
90.A Brief Tour of FreeIPA10:10
91.Move a Volume Group to Another Computer9:54
92.Linux sudo bug allow privilege escalation attacks9:19
93.Linux File Types9:12
94.View System Info with lspci and lsusb9:00
95.New Trojan malware infects Linux Devices. Linux devices used for attacks.8:59
96.Creating Linux Swap Partitions8:58
97.Set the timezone with timedatectl8:54
98.Ethereum Classic Airdrop Scam8:47
99.UPDATE! Ethereum Classic Airdrop Scam8:43Vlog
100.Defeat Microsoft Office Macro Viruses with LibreOffice8:40