Linux Pro Reacts To LTT Linux Challenge 2026 Pt 2

Brodie Robertson · Intermediate ·🔐 Cybersecurity ·6h ago
Part 2 is a bit late but it's finally time for more of the Linus Tech Tips 30 Day Linux challenge for 2026, part 1 was a little bit rough but I think part 2 addressed a lot of the issues I had with the first part. ==========Support The Channel========== ► Patreon: https://brodierobertson.xyz/patreon ► Paypal: https://brodierobertson.xyz/paypal ► Liberapay: https://brodierobertson.xyz/liberapay ► Amazon USA: https://brodierobertson.xyz/amazonusa ==========Resources========== LTT 30 Day Linuc Challenge Pt 2: https://www.youtube.com/watch?v=QK02VOGWEv0 =========Video Platforms========== 🎥 React: https://www.youtube.com/@BrodieRobertsonReacts 🎥 Podcast: https://techovertea.xyz/youtube 🎮 Gaming: https://brodierobertson.xyz/gaming ==========Social Media========== 🎤 Discord: https://brodierobertson.xyz/discord 🐦 Twitter: https://brodierobertson.xyz/twitter 🌐 Mastodon: https://brodierobertson.xyz/mastodon 🖥️ GitHub: https://brodierobertson.xyz/github ==========Credits========== 🎨 Channel Art: Profile Picture: https://www.instagram.com/supercozman_draws/ 🎵 Ending music Track: Debris & Jonth - Game Time [NCS Release] Music provided by NoCopyrightSounds. Watch: https://www.youtube.com/watch?v=yDTvvOTie0w Free Download / Stream: http://ncs.io/GameTime #Linux #LinusTechTips #LinuxDistro #FOSS #OpenSource DISCLOSURE: Wherever possible I use referral links, which means if you click one of the links in this video or description and make a purchase I may receive a small commission or other compensation.
Watch on YouTube ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Twitter OSINT & Threat Intelligence: Toolkit for Ethical Hackers & Security Analysts
Use Twitter for OSINT and threat intelligence to enhance security posture ethically and effectively
Medium · Startup
Twitter OSINT & Threat Intelligence: Toolkit for Ethical Hackers & Security Analysts
Learn to leverage Twitter for OSINT and threat intelligence to strengthen security posture
Medium · Cybersecurity
Your Encrypted Laptop Isn’t as Safe as You Think
Encryption alone may not protect your laptop data from theft, understand the limitations and take additional measures
Medium · Cybersecurity
TCP, Firewalls, Port Forwarding & VPNs — How Data Is Sent and Secured
Learn how data is sent and secured over the internet using TCP, firewalls, port forwarding, and VPNs
Medium · Cybersecurity
Up next
A single PR just hijacked the NPM registry...
Fireship
Watch →