Color and Learn Linux with Red Hat Books

Color and learn Linux

The truth is that as a child I never liked coloring books. I didn't have the patience or maybe it's my inability to respect limits. However, there are adults who today still enjoy this activity, to the point that there are publishers that produce this type of content for the elderly. If you are one of those and also want to learn about containers at the same time, Red Hat gives you a hand. Yes, in English.

It must be said that beyond the controversial decision they took with CentO S, the boys in the red hat They were always very generous in providing developers with free learning tools and content.

Color and learn Linux with these books.

Among the educational contents there are books. From the collection, three are specifically for coloring. Of these, there are two dedicated to the topic of containers and one to SELinux.

Please note that to download this content you will have to register as a developer in the dedicated Red Hat portal.

But, let's see the detail of the titles:

SELinux Coloring Book

To find out if we want to read (and color) a book about SELinux, we must understand what we are talking about.

La s as well as the e are the initials in English for enhanced security. SELinux is an architecture that allows administrators to determine who and how accesses the system.

Through a set of rules known as security policies, SELinux defines access controls for applications, processes, and files.

In case an application or process requests, for example, access to a file, it consults the access vector cache (AVC), where the permissions of objects and subjects are stored. This is in case that permission has previously been requested.

If it is a request that was not previously made, SELinux sends the request to the firewall, where the security context of the application or process and file is analyzed. The security context is applied from the SELinux policy database. This determines whether permission is granted or denied.

With the help of a dog and a cat, book invites us to learn the basic use of SELinux including multi-category security application (MCS) and multi-level security application (MLS)

The Container Coloring Book: Who's afraid of the big bad wolf?

Containerization is a technology that has been gaining popularity in recent years. Basically it allows to run an application in isolation from the rest of the operating system since it contains everything that is needed for the executionn. This is very useful for testing without creating conflicts with other programs and avoiding security problems.

En this technological version ofthe classic tale, the three little pigs will help us prevent the big bad wolf from sabotaging our applications run in containers. Along the way we will learn basic concepts such as namespaces, resource control, security, images, open standards, and management.

The Container Commandos Coloring Book

To expand our container concepts, now we will share the Adventures of a decentralized group of superheroes who must prevent an asteroid storm from destroying our planet. For this they will have to redesign the container-based shield system.

The tools covered are:

  • Podman: The Red Hat Alternative for Container Creation and Management.
  • CRI-O: Another Red Hat technology that allows Kubernetes to run containers without the need for additional add-ons. If you're wondering, Kubernetes is a container management tool.
  • Buildah: Tool that allows creating containers according to the standards of the Open Container Initiative.
  • Skopeo: A command line utility that makes it easy to work with container images and their repositories.
  • OpenShift: Another Red Hat development based on Kubernetes that allows the simultaneous execution of web applications in different languages.

How to work with books

In theory, you should print the book and use pencils to color them. In practice you can use The Gimp or LibreOffice Draw to open the pdf and use its painting tools. Don't cheat, use the pencil or brush and not the automatic fill.

The content of the article adheres to our principles of editorial ethics. To report an error click here.

Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *



  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.