Language Selection

English French German Italian Portuguese Spanish

today's howtos

Filed under
HowTos
  • Shading in Blender – Linux Hint

    Shading is an act of adding shade to a drawn object to give it a look and a perception of depth. Nobody likes white bland 3D objects. In 3D modeling, it is very significant to give objects some color material or texture. The process of adding shades to color materials and textures is called shading. Shading is so essential in 3D modeling that Blender has a dedicated workspace for shading.

    Shading workspace will automatically bring us in the “Look Dev” mode. Look Dev mode approximates lights and gives a general idea of the output of the object or scene. The shader editor will show the shader nodes of the selected object. Every object in Blender can be assigned a default material with white shading. And these shaders can be manipulated in the Shading workspace. You can add material to any object by going into the material tab.

  • Blender Viewport Navigation – Linux Hint

    The viewport is the main view of Blender that a user sees after getting it installed. At first look, it may appear intimidating, but it has become a lot comprehensible after the launch of the 2.80 version. The interface is less complicated and simple to learn.

    The viewport is a window that allows you to look around the scene or object you created. Viewport and camera view can be confusing, but both are not similar. A camera is an object in the scene, whereas the viewport is a part of the interface.

    Basics of navigating viewport include rotating, zooming, and panning the perspective of the view. There are various ways to navigate in the viewport.

  • Blender Cloud Rendering – Linux Hint

    How does it feel when you create a beautiful scene in Blender with high definition textures, shaders, particles, and volumetric effects and when you click on rendering, it just says that you need 2 hours to render just one frame? Yes, it feels discouraging. It is not easy to render a high-quality image or animation using an ordinary workstation.

    It is not a piece of cake to render in Blender, especially when working in Cycles (rendering engine). 3D rendering requires a lot of computing power. If you are rendering an animation, then it will take much more power and time. It would be best if you had a powerful PC with high-end specifications to get decent results. The trouble is the affordability of a robust workstation; they are costly. But this issue is fixable; just use cloud rendering.

  • Delete/Drop a Database in MySQL – Linux Hint

    MySQL is an RDBMS (Relational Database Management System) that is famous for its speed and easy-to-use interface. In this article, you will learn about the different methods to delete or drop a database in MySQL. In this article, we assume that you already have a working knowledge of the creation and listing of databases in MySQL. So, feel free to read on if you have already installed MySQL on your system and have some dummy databases in MySQL that you want to delete.

  • CentOS 8 Restart Network – Linux Hint

    Among the most frequent system administration practices is the process of restarting the network. To connect your machine with the Internet, a sound networking service is always required. At times, due to undesirable issues, the networking service in a particular operating system may start malfunctioning. If the issue is temporary, then it can be resolved simply by restarting your networking service.

    There are multiple methods that you can use in any operating system to restart the system’s networking service. Today, we walk you through the two primary methods of restarting the network service in CentOS 8, one of the most popular distributions of the Linux operating system.

    If you are using a system based on CentOS 8 and are not able to establish a secure connection with your network, you would be shocked by how many issues a quick restart can solve. You can restart the Linux networking service using various commands, but you must execute the commands to restart the network using sudo or su commands as a root user.

  • Installation of Sublime text editor on Ubuntu 20.04

    Sublime Text is a well-known text editor used to write source code for web development. This tutorial will assist you in installing Sublime Text on an Ubuntu 20.04 machine.

  • WireShark in-depth Tutorial – Linux Hint

    Wireshark is an open-source and free network traffic inspection tool. It captures and displays packets in real-time for offline analysis in a human-readable format with microscopic details. It requires some sound knowledge of basic networking and is considered an essential tool for system administrators and network security experts.
    Wireshark is the de-facto go-to tool for several network problems that vary from network troubleshooting, security issue examination, inspecting network traffic of a suspicious application, debugging protocol implementations, along with network protocol learning purposes, etc.

    The Wireshark project was initiated in 1998. Thanks to the global networking expert’s voluntary contribution, it continues to make updates for new technologies and encryption standards. Hence, it’s by far one of the best packet analyzer tools and is utilized as a standard commercial tool by various government agencies, educational institutes, and non-profit organizations.

More in Tux Machines

9to5Linux Weekly Roundup: January 17th, 2021

Thank you everyone for following 9to5Linux on social media; we’re nearing 6K followers on Twitter and that’s only possible thanks to you guys! Thank you again to everyone who donated so far to help me keep this website alive for as long as possible. This week has been quite interesting despite the fact that no major releases were planned. We saw the launch of a new PinePhone Linux phone edition, the release of the Flatpak 1.10 and Wine 6.0 software, and much more. Read more

Security Leftovers

  • New coalition aims to combat growing wave of ransomware attacks [iophk: Windows TCO]

    The California-based nonprofit aims to produce recommendations that will help governments and the private sector tackle the scourge of ransomware attacks.

    [Attackers] have increasingly used these types of attacks -- which involve accessing and encrypting the victim’s network and demanding payment to allow access again -- to hit major targets, with city governments in Atlanta, Baltimore and New Orleans severely impaired by ransomware attacks over the past two years.

    More recently, hospitals have become a target during the COVID-19 pandemic, with cyber criminals seeing vulnerable hospitals as easy targets more likely to pay a quick ransom as health care systems struggle to keep up with coronavirus cases. In some instances, the cyberattacks have been blamed for deaths due to delayed care.

  • This tiny shortcut can completely crash your Windows 10 device

    A zero-day exploit has been discovered that can crash your Windows 10 device – and, even more worrying, can be delivered inside a seemingly harmless shortcut file. The vulnerability can corrupt any NTFS-formatted hard drive and even be exploited by standard and low privilege user accounts.

    Security researcher Jonas Lykkegaard referenced the vulnerability on Twitter last week and had previously drawn attention to the issue on two previous occasions last year. Despite this, the NTFS vulnerability remains unpatched.

    There are various ways to trigger the vulnerability that involve trying to access the $i30 NTFS attribute on a folder in a particular way. One such exploit involves the creation of a Windows shortcut file that has its icon location set to C:\:$i30:$bitmap. Bleeping Computer found that this triggered the vulnerability even if users did not attempt to click on the file in question. Windows Explorer’s attempts to access the icon path in the background would be enough to corrupt the NTFS hard drive.

  • This Easily-Exploitable Windows 10 NTFS Bug Can Instantly Corrupt Your Hard Drives

    Jonas says that this Windows 10 bug isn't new and has been around since the release of Windows 10 April 2018 Update, and remains exploitable on the latest versions, as well. BleepingComputer shared that the problematic command includes $i30 string, a Windows NTFS Index Attribute associated with directories.

    [...]

    After running the command, Windows 10 will start displaying prompts to restart the device and repair the corrupted drive. Apparently, the issue also impacts some Windows XP versions and similar NTFS bugs have been known for years but are yet to be addressed by the Windows maker.

  • Nidhi Razdan, Phishing, And Three Hard Lessons

    Nidhi Razdan, a career journalist, became a victim of an elaborate phishing attack that made her quit her 21-year-old job and part with many of her personal details.

  • Windows Finger command abused by phishing to download malware

    Attackers are using the normally harmless Windows Finger command to download and install a malicious backdoor on victims' devices. The 'Finger' command is a utility that originated in Linux/Unix operating systems that allows a local user to retrieve a list of users on a remote machine or information about a particular remote user. In addition to Linux, Windows includes a finger.exe command that performs the same functionality.

Security Auditing Tools For Ubuntu

Malware, where aren’t thou found? Well, even our wonderful Ubuntu can be infected. So what can we do about it? Hope and pray we keep our system safe and better yet, audit our systems regularly for malwares and rootkits. There are 4 system auditors for Ubuntu that we will review - lynis, rkhunter, chkrootkit, and clamav. [...] Oddly enough, there aren’t many tools to scan for malware out there for Linux. Why? I’m not sure. However, these 4 tools are more than enough to detect malwares, rootkits, and viruses. Read more Also: Windows Finger command abused by phishing to download malware

today's howtos

  • Easily rename your Git default branch from master to main

    You might say, "I'm all for not using master in master-slave technical relationships, but this is clearly an instance of master-copy, not master-slave."

  • How to get IP Address in Linux using Command terminal - Linux Shout

    To connect some local running server application via browser, access FTP server, and many other times we require to know our system Ip address. Thus, if you are running some Linux operating system then here is the way to check out your current IP Address using the command terminal.

  • How To Use NMAP

    Nmap (or Nmapper) is a free and open-source network scanner used for analysis, security audits, and network exploration. You use it to discover hosts and services on a computer network by sending packets and analyzing the responses all in an easy-to-use manner. Let us take a look at how to use Nmap.

  • How to get the best Arch Linux servers to update your system | Arcolinux.com

    You may have seen me struggle with the Arch Linux servers in one of my videos. Time to dive into the application reflector. Read all about it on your own computer. Type reflector –help in the terminal and read more. Servers speed and service all depend on your own network, your isp, your country’s policy (port blocking) and the servers around you. As a result we have now several aliases to get the best servers out there.

  • How to Install Terraform on Ubuntu 20.04

    Terraform is an infrastructure as a code platform developed by HashiCorp. You can simply write code in the human-readable format following HashiCorp Configuration Language (HCL) and deploy it to get the infrastructure in the cloud. Terraform is supported in many cloud providers like Google, Amazon, Alibaba, etc. Here in this article, we are going to install the latest version of terraform on Ubuntu. We are performing terraform installation on Ubuntu 20.04 however you can do the same procedure on all Linux platforms. Also, learn how to use terraform with simple example by launch an ec2 instance and create s3 bucket.

  • Operator integration testing for Operator Lifecycle Manager - Red Hat Developer

    Operators are one of the ways to package, deploy, and manage application distribution on Red Hat OpenShift. After a developer creates an Operator, the next step is to get the Operator published on OperatorHub.io. Doing this allows users to install and deploy the Operator in their OpenShift clusters. The Operator is installed, updated, and the management lifecycle is handled by the Operator Lifecycle Manager (OLM).

  • Deploy your own Matrix server on Fedora CoreOS - Fedora Magazine

    Today it is very common for open source projects to distribute their software via container images. But how can these containers be run securely in production? This article explains how to deploy a Matrix server on Fedora CoreOS.

  • Set up a minimal server on a Raspberry Pi | Opensource.com

    Recently, the microSD (secure digital) card in my Raspberry Pi stopped working. It had been in constant use as a server for almost two years, and this provided a good opportunity to start fresh and correct a few problems. After its initial installation, it began experiencing disk problems and the official Raspberry Pi operating system (OS) received a significant update (and was renamed from Raspbian to Raspberry Pi OS). So I acquired a new microSD card and preceded to rebuild. Although this Raspberry Pi 3 Model B isn't the latest hardware, it is still adequate for running a minimal server for various services. I think my original installation used the full operating system image that includes the graphical user interface and a lot of other software packages unnecessary for my needs. This step-by-step guide shows how I set up my Raspberry Pi with the most minimal configuration to conserve precious system resources.