Language Selection

English French German Italian Portuguese Spanish

HowTos

How-To: Postfix and Virtual Hosts

Filed under
HowTos

Postfix comes as the default mail server under unbuntu. By default, it is set such as it can basically send system notice mail to the user you predefined during install. During this how-to, I’m going to explain how you can set virtual domains that will forward your mail back to another email adress of yours.

Learning Linux the Easy Way - With Cygwin

Filed under
HowTos

Linux expert John Traenkenschuh offers step-by-step instructions on how to set up a Linux environment on your Windows PC. If you want an easy way to try Linux, Traenkenschuh shows that Cygwin is the perfect way to get many UNIX tools for free.

Flash Player 8.5 Linux

Filed under
HowTos

It was tested on Dapper Drake beta 2 (on x86 - 32 bit machine)

1.install wine
sudo apt-get install wine

RPM for Newbies

Filed under
HowTos

I was in doubt about writing this article. There are several tutorials covering this topic but I want to try to write a simple article that shows the basis of rpm usage. So this is not an advanced tutorial but a document for the impatient and the people that performs simple operations with rpm.

Building a snort enabled (Linux) gateway

Filed under
HowTos

Today I build a snort enabled gateway, the risk of getting the Windows XP workstations infected by some kind of exploit or virus is getting bigger and bigger. We all have the zero-day WMF-exploit fresh in mind and the risk of getting infected by some foolish Windows exploit is just too big.

Kernel Panic: Defining System Inconsistencies

Filed under
HowTos

Kernel panic refers to a message displayed by an operating system after detecting a system inconsistency from which it cannot recover completely (Linux displays the Kernel Panic, while Windows displays the Blue Screen of Death - soon to become Red in Vista).

Accessing Windows Shares From a GNU/Linux Desktop

Filed under
HowTos

Many people work for companies that have a Windows-based infrastructure, while they have a GNU/Linux desktop. You could use something like VNC or rdesktop to gain access to files on Windows shares, but a couple of command-line utilities from the Samba suite are a nice option that let you gain access right from your desktop.

Smart formatting for better compatibility between OpenOffice.org and MS Office

Filed under
HowTos

I'm going to talk about the backbreaking labor of helping someone move and a seemingly unrelated topic, OpenOffice.org -- Microsoft Office compatibility. The two word processors are actually surprisingly similar; this article will show how doing things through the program features, rather than manually, helps you create documents that convert better between office suites.

Digging More Secure Tunnels with IPsec

Filed under
HowTos

In my last article about IPsec we learned about the building blocks of IPsec in the Linux kernel. We took a look at the tools needed to build encrypted and secured data paths between two hosts. Now we'll use this knowledge and move a step further on.

Syndicate content

More in Tux Machines

today's howtos

  • A guided tour of Linux file system types

    While it may not be obvious to the casual user, Linux file systems have evolved significantly over the last decade or so to make them more resistant to corruption and performance problems. Most Linux systems today use a file system type called ext4. The “ext” part stands for “extended” and the 4 indicates that this is the 4th generation of this file system type. Features added over time include the ability to provide increasingly larger file systems (currently as large as 1,000,000 TiB) and much larger files (up to 16 TiB), more resistance to system crashes and less fragmentation (scattering single files as chunks in multiple locations) which improves performance.

  • Testing the Linux Malware Detect.
  • Kushal Das: Remember to mark drive as removable for tails vm install

    If you are installing Tails into a VM for testing or anything else, always remember to mark the drive as a removable USB drive. Otherwise, the installation step will finish properly, but, you will get errors like the following screenshot while booting from the drive.

  • How to Set DNS Nameservers on Ubuntu 18.04

Security Leftovers

  • NSA Researchers Talk Development, Release of Ghidra SRE Tool

    The National Security Agency released its classified Ghidra software reverse-engineering (SRE) tool as open source to the cybersecurity community on April 4. NSA researchers Brian Knighton and Chris Delikat shared how Ghidra was built and the process of releasing it at Black Hat 2019. Ghidra is a framework developed by the NSA’s Research Directorate for the agency’s cybersecurity mission. It’s designed to analyze malicious code to give security pros a better understanding of potential vulnerabilities in their networks and systems.

  • Linux Is Being Hit with Zero-Day Exploits/ Zero-Day Attacks [Ed: This is not news. If you have a system that is unpatched for months, despite many warnings, it is a risk, no matter the OS/kernel.]

    It was once the popular opinion that Linux was immune to zero-day exploits. However, even before the Equifax exploit, vulnerabilities were found in Linux distributions like Fedora and Ubuntu. In particular, back in 2016, a security researcher discovered that you could exploit a Linux system by playing a specific music file. Then, in 2017, a group of attackers used Struckshock vulnerability to carry on the attack on Equifax. These zero-day attacks are Advanced Persistent Attacks that exploit recently discovered vulnerabilities. Read on to learn more about what are zero-day exploits and how they can affect a Linux system.

  • Intel, Google, Microsoft, and Others Launch Confidential Computing Consortium for Data Security

    Major tech companies including Alibaba, Arm, Baidu, IBM, Intel, Google Cloud, Microsoft, and Red Hat today announced intent to form the Confidential Computing Consortium to improve security for data in use.

  • Intel, Google, Microsoft, and others launch Confidential Computing Consortium for data security

    Major tech companies including Alibaba, Arm, Baidu, IBM, Intel, Google Cloud, Microsoft, and Red Hat today announced intent to form the Confidential Computing Consortium to improve security for data in use. Established by the Linux Foundation, the organization plans to bring together hardware vendors, developers, open source experts, and others to promote the use of confidential computing, advance common open source standards, and better protect data. “Confidential computing focuses on securing data in use. Current approaches to securing data often address data at rest (storage) and in transit (network), but encrypting data in use is possibly the most challenging step to providing a fully encrypted lifecycle for sensitive data,” the Linux Foundation said today in a joint statement. “Confidential computing will enable encrypted data to be processed in memory without exposing it to the rest of the system and reduce exposure for sensitive data and provide greater control and transparency for users.”

Linux-driven modules to showcase new MediaTek AIoT SoCs

Innocomm is prepping an “SB30 SoM” with the new quad -A35 MediaTek i300 followed by an “SB50 SoM” with an AI-equipped, octa-core -A73 and -A53 MediaTek i500. Both modules ship with Linux/Android evaluation kits. Innocomm, which has produced NXP-based compute modules such as the i.MX8M Mini driven WB15 and i.MX8M powered WB10, will soon try on some MediaTek SoCs for size. First up is an SB30 SoM due to launch in October that will run Linux or Android on MediaTek’s 1.5GHz, quad-core, Cortex-A35 based MediaTek i300 (MT8362) SoC. In November, the company plans to introduce an SB50 SoM based on the MediaTek i500 (MT8385). Read more

Devices: Raspberry Pi and More