Showing headlines posted by linuxer
« Previous ( 1 ... 19 20 21 22 23 24 25 26 27 28 29 ... 32 ) Next »Protect Your System. Run Your Browser In Firejail
The single biggest threat to your Linux system is your web browser. When you think about it, it makes perfect sense. A browser is a large and complex piece of software with the ability to execute code, and it accesses the open Internet and executes just about everything that it comes into contact with.
How to create and manage KVM virtual machines from CLI
Knowing how to create and manage KVM virtual machines from command line can be really useful in certain scenarios: when working on headless servers, for example. Nonetheless, being able to script interactions with virtual machines can greatly improve our productivity. In this tutorial you will learn how to create, delete, clone and manage KVM machines with the help of few utilities.
How to Install Gitlab On Debian 9 Stretch Linux
Gitlab is an awesome free software alternative to Github. It allows teams and individual developers to host and manage their own projects on servers that they control. Debian Stretch provides a stable foundation for Gitlab and can make for an excellent code repository server. Plus, Gitlab's Omnibus Package makes installation super simple.
How to Install The Latest Mesa Version On Debian 9 Stretch Linux
Mesa is a big deal if you're running open source graphics drivers. It can be the difference between a smooth experience and an awful one. Mesa is under active development, and it sees constant noticeable performance improvements. That means it's really worthwhile to stay on top of the latest releases.
Introduction to Bash shell redirections
Redirection is the ability to redirect the input and output of various commands to and from files or devices. We are going to see how redirecting works in Bash: the default shell in the majority of Linux distributions.
How to Setup a VPN with OpenVPN on Debian 9 Stretch Linux
Setting up your own VPN is no small task, but there are plenty of reasons that you'd want to do it. For one, when you run your own VPN, you have complete control of it and know exactly what it's doing.
Security is an important factor for VPNs. It's possible to set up a simple one in a few minutes, but it won't be secure at all. You need to take the appropriate steps to ensure that both the server and your connections remain private and encrypted.
Security is an important factor for VPNs. It's possible to set up a simple one in a few minutes, but it won't be secure at all. You need to take the appropriate steps to ensure that both the server and your connections remain private and encrypted.
Amp Up Your Multimedia Experience On Debian 9 Strech Linux
Debian is the universal operating system, but sometimes, it doesn't feel all that universal out of the box. For people looking for a top-notch multimedia experience, Debian might not seem like the best choice because of its free software policies, but it can actually be made into a multimedia powerhouse.
How to upgrade Debian 8 Jessie to Debian 9 Stretch
This article explains a system upgrade procedure from Debian 8 Jessie Linux to Debian 9 Stretch. Apart from the up to date Linux kernel, Stretch comes with a considerable amount of new and updated software as well as a number of packages had been rendered obsolete.
Introduction to SELinux concepts and management
SELinux (Security Enhanced Linux) is an implementation of a Mandatory Access Control permission system (MAC) in the Linux kernel. This type of access control differs from Discretionary Access Control systems (DAC) like ACLs and standard unix ugo/rwx permissions, in how the access to a resource is provided.
How to manage ACLs on Linux
ACLs are a second level of discretionary permissions, that may override the standard ugo/rwx ones. When used correctly they can grant you a better granularity in setting access to a file or a directory, for example by giving or denying access to a specific user that is neither the file owner, nor in the group owner.
How to Install Spotify On Fedora Linux
Spotify is probably the most popular streaming music service in the world right now, and it does have a native Linux client. Unfortunately, that client isn't available in the official Fedora repositories or the Spotify Linux repositories. The community has come to the rescue, though, and it is available from a popular third party Fedora repository that is even recommended by the Fedora Project.
Download Video From The Command Line With Youtube-dl
People have wanted to download videos from YouTube since the very beginning. Several methods have worked over the years, but youtube-dl provides the most direct and reliable approach. Youtube-dl is a Python script that pulls videos straight from YouTube and can format them on your computer. It can also separate audio or subtitles from videos.
Python Exception Handling
Python will let you know when you get your syntax wrong. It'll immediately fail and not allow your program to run. What about when your code has a different type of problem? Those are called exceptions, and they tend to be harder to catch. It's up to you to recognize situations where hey might come up and catch them to prevent your program from crashing altogether.
Test And Recover Your Passwords By Cracking Them With Hashcat
Hashcat is a robust password cracking tool that can help you recover lost passwords, audit password security, benchmark, or just figure out what data is stored in a hash.
There are a number of great password cracking utilities out there, but Hashcat is known for being efficient, powerful, and full featured. Hashcat makes use of GPUs to accelerate hash cracking. GPUs are much better and handling cryptographic work than CPUs are, and they can be utilized in much greater numbers than CPUs.
Encrypt Your Email With GPG, Thunderbird, and Enigmail
Encrypting everything online is becoming more important by the day. Email is no different. For Linux users, the process is actually very simple with three common open source tools; Mozilla Thunderbird, Enigmail, and GNU PGP(GPG.) Through the use of these three tools, you can send and receive encrypted messages easily, and protect yourself and the people you're communicating with from attackers and privacy invasions.
Protect Your Online Privacy With The Tor Browser Bundle
For anyone looking to protect their privacy online, Tor is an invaluable tool. It is both one of the most reliable ways to hide your identity and one of the easiest to use.
There are multiple different ways to use Tor, but the simplest and quickest is the Tor Browser bundle. It is a self-contained Tor installation coupled with a specially configured Firefox installation designed to get you up an running with as few hassles and as little configuration as possible.
Python Inheritance
Inheritance is yet another key concept in Object Oriented Programming, and it plays a vital role in building classes. It allows a class to be based off on an existing one.
When you first started writing Python classes, you were told to just put "Object" in the parenthesis of the class definition and not think too much about it. Well, now's the time to start thinking about it.
How to perform a faster data compression with pbzip2
What if you would be able to perform a data compression four times faster, with the same compression ratio as you normally do. Pbzip2 command line utility can easily accomplish this as it gives you an option to select number CPU and amount of RAM to be used during the compression process.
Tweet From the Linux Command Line With Rainbow Stream
Rainbow Stream allows you to manage just about every aspect of your Twitter account from the command line. Yes, you did read that right. It's a full featured command line Twitter client written in Python. Chances are, you're falling into one of two camps right about now. If you're in the slightly insane one that thinks this is a good idea, stay tuned.
Test WordPress Logins With Hydra on Kali Linux
There are web forms all over the Internet. Even sites that don't usually allow regular users to log in probably have an admin area. It's important when running and deploying a site to make sure that the passwords gating access to sensitive controls and admin panels are as secure as possible.
« Previous ( 1 ... 19 20 21 22 23 24 25 26 27 28 29 ... 32 ) Next »