Language Selection

English French German Italian Portuguese Spanish

today's howtos

Filed under
HowTos
  • 20 ps Command Examples to Monitor Linux Processes
  • Where are the config files in GNOME

    When you install a new distribution, you end up with a generic desktop. GNOME, when you choose standard Ubuntu. This works but the great joy of running Linux is to have it all your way. So, get your own tweaks in there. How can you change your desktop? In GNOME, you have tools and files to change it. In this post you will learn where to find the files and use the tools.

  • Driftnet command tutorial and examples

    Sniffing consists of intercepting packets through a network to get their content. When we share a network, intercepting the traffic going through it is pretty easy with a sniffer, that’s why protocol encryption such as https is so important, when traffic is unencrypted even credentials go in plain text and can be intercepted by attackers.
    This tutorial focuses on intercepting media, specifically images using the Driftnet sniffer, as you will see it will be only possible to capture images going through unencrypted protocols like http rather than https, and even unprotected images within sites protected with SSL (insecure elements).

  • Top 48 Linux Interview Questions & Answers

    Are you preparing for a Linux interview? We have prepared some of the commonly asked Linux interview questions and their answers.

    If you are a beginner (with some knowledge of Linux or having certification) or with professional Linux administration experience, then following Q & A help for your interview preparation.

  • Configuring a Cisco switch from a Linux Terminal with Minicom

    As much as I like playing in the terminal, the jury is still out as to how much I like working with Cisco. To be as objective as possible, I need to tell myself that: 1, I am not familiar with the command set or how they like to do things so I must be open minded; 2, Relax, the command line is a happy place to be and 3, this is new territory, don?t get frustrated, just write it down and enjoy the learning process. Also, my brother in-law, whose career is in network administration just loves this Cisco business so it turned out to be quite educational. The scope of this article is not how to set up a router, just, this is how I was able to get going with it.

    The specific Cisco switch I configured was a Catalyst 3560 series PoE-48. I am sure these direction will work with other similar devices. Since I am an openSUSE user, the directions are tailored as such.

More in Tux Machines

Security Leftovers

  • Russian [Attackers] Exploited Windows Flaws in Attacks on European Firms

    Analysis of the infrastructure used by the [attackers] led to the discovery of an executable named comahawk.exe that incorporated two local privilege escalation exploits targeting Windows.

    The vulnerabilities, tracked as CVE-2019-1405 and CVE-2019-1322, were patched by Microsoft in November 2019 and October 2019, respectively. Microsoft’s advisories for both these flaws say “exploitation [is] less likely”

    In mid-November 2019, NCC Group, whose researchers reported the vulnerabilities to Microsoft, published a blog post describing the weaknesses. Shortly after, someone made public an exploit named COMahawk that weaponizes CVE-2019-1405 and CVE-2019-1322.

  • Global insurer Chubb hit by Maze ransomware: claim [iophk: Windows TCO]

    According to its own website, Chubb had more than US$177 billion (A$291 billion) in assets and reported US$40 billion of gross premiums in 2019. The company says it has offices in Zurich, New York, London, Paris and other locations, and has more than 30,000 employees.

    iTWire contacted Chubb's Australian office for comment. A spokesperson responded: "We are currently investigating a computer security incident that may involve unauthorised access to data held by a third-party service provider.

  • Operation Poisoned News: Hong Kong Users Targeted With Mobile Malware via Local News Links

    A recently discovered watering hole attack has been targeting iOS users in Hong Kong. The campaign uses links posted on multiple forums that supposedly lead to various news stories. While these links lead users to the actual news sites, they also use a hidden iframe to load and execute malicious code. The malicious code contains exploits that target vulnerabilities present in iOS 12.1 and 12.2. Users that click on these links with at-risk devices will download a new iOS malware variant, which we have called lightSpy (detected as IOS_LightSpy.A).

Articles on Moving to GNU/Linux

  • A Beginners Guide to Linux

    The Linux operating system offers a rich mix of features and security that make it a great free and (mostly) open-source alternative to macOS and Microsoft Windows. Because it's different "under the hood," consider some of the big-picture aspects of Linux and how it compares to the other desktop operating systems, before you take the plunge.

  • [Older] 5 Linux Distributions for Windows 7 Users

    While you may not find the same applications or tools on Linux – the user interface is what will make you feel comfortable using the OS.

    So, in this article, I shall mention only the distributions that resemble the look and feel of Windows (to some extent, at least).

    Once, you’re done choosing what you want – you can simply take a look around for the essential applications available on Linux, installing themes, and a lot of similar resources available in our portal.

  •                
  • The Complete Beginner's Guide to Ubuntu Linux
                     
                       

    Before you install Ubuntu on top of your current operating system, it's a good idea to try it out first. There are various ways to try Ubuntu, and the following guides will help: [...]

  •                
  • [Old] Try Ubuntu before you install it
                     
                       

    Running Ubuntu directly from either a USB stick or a DVD is a quick and easy way to experience how Ubuntu works for you, and how it works with your hardware. Most importantly, it doesn’t alter your computer’s configuration in any way, and a simple restart without the USB stick or DVD is all that’s needed to restore your machine to its previous state.

                       

    With a live Ubuntu, you can do almost anything you can from an installed Ubuntu:

The state of open source contribution through the lens of Hacktoberfest

In 2019, DigitalOcean and the open source community celebrated the sixth annual Hacktoberfest, an inclusive community event that inspires open source participation and maintenance. It was an exciting year with record-breaking numbers of pull requests, participants, and events around the world. From the start, our goal has always been to encourage all types of people, from seasoned developers to total newcomers, to get more involved with open source, all while promoting DigitalOcean's longstanding values of simplicity, community, and love. We recapped Hacktoberfest 2019 on our blog, but in honor of the 22nd anniversary of open source, we decided to dive into the results of our annual participant survey within the context of our seasonal Currents report on the state of open source. This year, we revamped the Hacktoberfest survey to better understand what it means to the community, as well as their involvement with open source projects, key motivators for participating, and more. So how did the community do? Here are some findings. Read more

Android Leftovers