Language Selection

English French German Italian Portuguese Spanish

today's howtos

Filed under
HowTos
  • How to Access Google Drive on Debian 10

    Google Drive is a cloud storage and synchronization service that allows users to keep, synchronize, and share files across many devices. It offers 15GB of free storage space for each Google account to store files.

  • Keep track of multiple Git remote repositories | Opensource.com

    Working with remote repositories gets confusing when the names of the remote repositories in your local Git repo are inconsistent.

  • Merging and sorting files in Linux: Easier than you think
  • How to Administrate CloudLinux OS from Command Line
  • 5 Ways to Install IntelliJ IDEA on Ubuntu

    Here learn how to download and install IntelliJ on Ubuntu. Intellij Idea can be installed simply from GUI and also from CLI.

  • How to Install Htop in Centos 8? – Linux Hint

    Htop is more like an immersive Centos 8 system process viewer and device monitor. It shows resource-usage measures in color and helps you to conveniently keep track of the performance of your system as an enhancement. With both an additional array of choices and a clear picture on the board, it is the same as the standard main command. It shows details about the usage of Processor & RAM, tasks being done, average load, and uptime. Besides, Htop shows a list of all operating processes and can even show it in a tree-like structure. If you are interested to interactively control your device, then one of your best choices ought to be the Htop command. It runs on all distributions of Linux, and in most situations, is enabled by default.

    In this tutorial, you will learn to install Htop on Centos 8 using the command-line.

  • How to Install Steam on NixOS? – Linux Hint

    When installing things on NixOS, you need to have a package in the right format on the nixos.org web page. Steam is available, but some quirks may trip you up when you try to install it. You will hear more about this here.

    In particular, it is a non-free software package, so you must enable this option. You will also need to handle the ‘glXChooseVisual failed’ problem. The process will work one way in NixOS and another way on other distributions. It is more complex with just the Nix package manager.

  • How to Install and Configure Angular CLI on Linux Distributions

    Modern and dynamic websites require many features, menus, and widgets to make the website user-friendly and reach the perfect marketplace. No matter which tool you use to create your website, javascript is always required to draw the finishing line

  • How to Install and Use FFmpeg in CentOS 8? – Linux Hint

    If you’d like a fast way of converting between audio and video files in Linux and would like something that doesn’t chew on resources and does the task properly, then you may give FFmpeg a try. FFmpeg is vital for keeping some level of familiarity between files uploaded by multiple users, as well as help maintain your storage space under control. When using FFmpeg, you can translate, adjust sample rates, record audio/video streams, and resize files between different video and audio formats. It provides a collection of audio and video libraries that are shared, including libavcodec, libavformat, and libavutil. Whenever it refers to converting files, FFmpeg has several command-line choices, and it is also recommended to use it from the CLI. Follow me on, and I’ll lead you to install FFmpeg in Centos 8.
    FFmpeg is not offered in the default repositories of Centos 8. You may opt to build FFmpeg utilities from the source or install them from the Negativo17 directory via DNF. In this article, we’ll move ahead with the second choice. It is also the fastest way to implement FFmpeg on the Centos 8 OS.

  • How to Kill Zombie Processes on Linux

    Linux, of course, has to keep track of all the applications and daemons running on your computer. One of the ways it does this is by maintaining the process table. This is a list of structures in kernel memory. Each process has an entry in this list that contains some information about it.

    There isn’t a great deal in each of the process table structures. They hold the process ID, a few other data items, and a pointer to the process control block (PCB) for that process.

    It’s the PCB that holds the many details Linux needs to look up or set for each process. The PCB is also updated as a process is created, given processing time, and finally destroyed.

  • How to Setup a Firewall with UFW on Debian 10 Linux - Linux Concept

    Nowadays, a Firewall is an essential utility and property of any system for security; by default Debian Operating system having a firewall configuration tool named UFW (Uncomplicated Firewall). UFW is a user-friendly front-end tool to manage iptables firewall rules. It provides you more straightforward methods to manage iptables as the name of this tool start from Uncomplicated.

  • How to Use arping Command in Linux – Linux Hint

    To a network administrator, the ARP protocol may sound familiar. ARP is a protocol that Layer 2 devices implement for discovering and communicating with each other. The arping tool works using this protocol.
    Now, why would you need arping? Imagine you are working with a small office network. Using the classic ping command to ping hosts to verify their availability is very tempting, right? Well, if you are using the ICMP protocol, then you are actually performing ARP requests for probing devices in the network.

    This is where the arping tool comes in. Like ping, arping pings network hosts using network layer ARP packets. This method is useful for hosts that do not respond to Layer 3 and Layer 4 ping requests.

    This article shows you how to use arping command in Linux.

  • How to configure YAML schema to make editing files easier - Red Hat Developer

    YAML is a friendly data serialization standard that works with all programming languages. While configuration files are often defined in YAML, it can even be used as a programming language, like the workflow language at Google, or Apache Camel K.

    It has the advantage of not having any braces, making it lightweight visually. One of the drawbacks is that editing YAML files may not always be easy. For instance, writing a tag at the wrong indentation level can be hard to detect. To help with editing, it is possible to provide a YAML schema that can be leveraged by a large set of integrated development environments (IDEs). Unfortunately, this practice is not widespread. Consequently, users waste time searching for a missing or extra space and browsing documentation.

    In this article, you will discover the benefits of providing a YAML schema and how to make it consumable for all your users, making it easier to edit YAML files.

  • How to connect and share data between two Linux systems

    I got an interesting request (not from singles in my area). One of my readers asked me, how does one go about connecting two Linux boxes - I presume for sharing purposes. This is a topic I've touched upon frequently, but often indirectly. As Commandant Lasard from Police Academy would say, there are many, many, many, many different ways to do this.

    So perhaps it's time for a proper tutorial. I will show you several common, robust ways to have two Linux systems communicate over network. We'll do it on the command line, then move up to file managers, and finally, also perform a remote data backup using a friendly GUI tool. Let's start.

  • How to manage user passwords on Linux

    If you’re a Linux admin, you probably take care of any number of servers, all of which contain numerous users. Those users log in via various means or protocols, such as SSH, FTP, HTTP. In order to successfully log in, those users have to have—passwords.

  • Linux patch management: How to back out a failed patch | Enable Sysadmin

    A good patch management plan always includes a good patch backout plan.

More in Tux Machines

9to5Linux Weekly Roundup: January 17th, 2021

Thank you everyone for following 9to5Linux on social media; we’re nearing 6K followers on Twitter and that’s only possible thanks to you guys! Thank you again to everyone who donated so far to help me keep this website alive for as long as possible. This week has been quite interesting despite the fact that no major releases were planned. We saw the launch of a new PinePhone Linux phone edition, the release of the Flatpak 1.10 and Wine 6.0 software, and much more. Read more

Security Leftovers

  • New coalition aims to combat growing wave of ransomware attacks [iophk: Windows TCO]

    The California-based nonprofit aims to produce recommendations that will help governments and the private sector tackle the scourge of ransomware attacks.

    [Attackers] have increasingly used these types of attacks -- which involve accessing and encrypting the victim’s network and demanding payment to allow access again -- to hit major targets, with city governments in Atlanta, Baltimore and New Orleans severely impaired by ransomware attacks over the past two years.

    More recently, hospitals have become a target during the COVID-19 pandemic, with cyber criminals seeing vulnerable hospitals as easy targets more likely to pay a quick ransom as health care systems struggle to keep up with coronavirus cases. In some instances, the cyberattacks have been blamed for deaths due to delayed care.

  • This tiny shortcut can completely crash your Windows 10 device

    A zero-day exploit has been discovered that can crash your Windows 10 device – and, even more worrying, can be delivered inside a seemingly harmless shortcut file. The vulnerability can corrupt any NTFS-formatted hard drive and even be exploited by standard and low privilege user accounts.

    Security researcher Jonas Lykkegaard referenced the vulnerability on Twitter last week and had previously drawn attention to the issue on two previous occasions last year. Despite this, the NTFS vulnerability remains unpatched.

    There are various ways to trigger the vulnerability that involve trying to access the $i30 NTFS attribute on a folder in a particular way. One such exploit involves the creation of a Windows shortcut file that has its icon location set to C:\:$i30:$bitmap. Bleeping Computer found that this triggered the vulnerability even if users did not attempt to click on the file in question. Windows Explorer’s attempts to access the icon path in the background would be enough to corrupt the NTFS hard drive.

  • This Easily-Exploitable Windows 10 NTFS Bug Can Instantly Corrupt Your Hard Drives

    Jonas says that this Windows 10 bug isn't new and has been around since the release of Windows 10 April 2018 Update, and remains exploitable on the latest versions, as well. BleepingComputer shared that the problematic command includes $i30 string, a Windows NTFS Index Attribute associated with directories.

    [...]

    After running the command, Windows 10 will start displaying prompts to restart the device and repair the corrupted drive. Apparently, the issue also impacts some Windows XP versions and similar NTFS bugs have been known for years but are yet to be addressed by the Windows maker.

  • Nidhi Razdan, Phishing, And Three Hard Lessons

    Nidhi Razdan, a career journalist, became a victim of an elaborate phishing attack that made her quit her 21-year-old job and part with many of her personal details.

  • Windows Finger command abused by phishing to download malware

    Attackers are using the normally harmless Windows Finger command to download and install a malicious backdoor on victims' devices. The 'Finger' command is a utility that originated in Linux/Unix operating systems that allows a local user to retrieve a list of users on a remote machine or information about a particular remote user. In addition to Linux, Windows includes a finger.exe command that performs the same functionality.

Security Auditing Tools For Ubuntu

Malware, where aren’t thou found? Well, even our wonderful Ubuntu can be infected. So what can we do about it? Hope and pray we keep our system safe and better yet, audit our systems regularly for malwares and rootkits. There are 4 system auditors for Ubuntu that we will review - lynis, rkhunter, chkrootkit, and clamav. [...] Oddly enough, there aren’t many tools to scan for malware out there for Linux. Why? I’m not sure. However, these 4 tools are more than enough to detect malwares, rootkits, and viruses. Read more Also: Windows Finger command abused by phishing to download malware

today's howtos

  • Easily rename your Git default branch from master to main

    You might say, "I'm all for not using master in master-slave technical relationships, but this is clearly an instance of master-copy, not master-slave."

  • How to get IP Address in Linux using Command terminal - Linux Shout

    To connect some local running server application via browser, access FTP server, and many other times we require to know our system Ip address. Thus, if you are running some Linux operating system then here is the way to check out your current IP Address using the command terminal.

  • How To Use NMAP

    Nmap (or Nmapper) is a free and open-source network scanner used for analysis, security audits, and network exploration. You use it to discover hosts and services on a computer network by sending packets and analyzing the responses all in an easy-to-use manner. Let us take a look at how to use Nmap.

  • How to get the best Arch Linux servers to update your system | Arcolinux.com

    You may have seen me struggle with the Arch Linux servers in one of my videos. Time to dive into the application reflector. Read all about it on your own computer. Type reflector –help in the terminal and read more. Servers speed and service all depend on your own network, your isp, your country’s policy (port blocking) and the servers around you. As a result we have now several aliases to get the best servers out there.

  • How to Install Terraform on Ubuntu 20.04

    Terraform is an infrastructure as a code platform developed by HashiCorp. You can simply write code in the human-readable format following HashiCorp Configuration Language (HCL) and deploy it to get the infrastructure in the cloud. Terraform is supported in many cloud providers like Google, Amazon, Alibaba, etc. Here in this article, we are going to install the latest version of terraform on Ubuntu. We are performing terraform installation on Ubuntu 20.04 however you can do the same procedure on all Linux platforms. Also, learn how to use terraform with simple example by launch an ec2 instance and create s3 bucket.

  • Operator integration testing for Operator Lifecycle Manager - Red Hat Developer

    Operators are one of the ways to package, deploy, and manage application distribution on Red Hat OpenShift. After a developer creates an Operator, the next step is to get the Operator published on OperatorHub.io. Doing this allows users to install and deploy the Operator in their OpenShift clusters. The Operator is installed, updated, and the management lifecycle is handled by the Operator Lifecycle Manager (OLM).

  • Deploy your own Matrix server on Fedora CoreOS - Fedora Magazine

    Today it is very common for open source projects to distribute their software via container images. But how can these containers be run securely in production? This article explains how to deploy a Matrix server on Fedora CoreOS.

  • Set up a minimal server on a Raspberry Pi | Opensource.com

    Recently, the microSD (secure digital) card in my Raspberry Pi stopped working. It had been in constant use as a server for almost two years, and this provided a good opportunity to start fresh and correct a few problems. After its initial installation, it began experiencing disk problems and the official Raspberry Pi operating system (OS) received a significant update (and was renamed from Raspbian to Raspberry Pi OS). So I acquired a new microSD card and preceded to rebuild. Although this Raspberry Pi 3 Model B isn't the latest hardware, it is still adequate for running a minimal server for various services. I think my original installation used the full operating system image that includes the graphical user interface and a lot of other software packages unnecessary for my needs. This step-by-step guide shows how I set up my Raspberry Pi with the most minimal configuration to conserve precious system resources.