901 private links
f3 is a simple tool that tests flash cards capacity and performance to see if they live up to claimed specifications. It fills the device with pseudorandom data and then checks if it returns the same on reading.
F3 stands for Fight Flash Fraud, or Fight Fake Flash.
How do I capture a specific protocol or port, such as 80 (HTTP) or 443 (HTTPS), using the TCPDump tool under Linux/UNIX? How do I record traffic with TCPDump and find problems later on with my network or server issues? Let’s dive into the nitty-gritty of capturing and analyzing your network traffic for trapshooting network and server issues.
Iptables is a firewall that plays an essential role in network security for most Linux systems. While many iptables tutorials will teach you how to create firewall rules to secure your server, this one will focus on a different aspect of firewall management: listing and deleting rules.
In this tutorial, we will cover how to do the following iptables tasks:
- List rules
- Clear Packet and Byte Counters
- Delete rules
- Flush chains (delete all rules in a chain)
- Flush all chains and tables, delete all chains, and accept all traffic
just
is a handy way to save and run project-specific commands.
Nmap is short for Network Mapper. It is an open-source security tool for network exploration, security scanning, and auditing. However, the Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. The purpose of this guide is to introduce a user to the Nmap command line tool to scan a host or network to find out the possible vulnerable points in the hosts. You will also learn how to use Nmap for offensive and defensive purposes. Let us see some common and practial nmap examples running on Linux or Unix-like systems.
Modern UNIX shells like bash (default on Linux) and zsh (default on macOS) keep a history of all the commands you enter. The easiest way to access this history is by pressing the up and down cursor keys to browse through the last commands.
But this is only the tip of the iceberg. There are many more powerful history features that are easy to overlook. Learning them and making them second nature will help you to become much faster with a shell.
Forgot your Linux root password? No worries! Our guide provides easy-to-follow instructions to reset and change it safely.
TL;DR
In GRUB menu:
- Find the line starting with “linux” and make sure it contains
rw
and notro
. - Then go and append
init=/bin/bash
to the end of the line. - Press Ctrl+x to start boot process.
- Change password
passwd
.
Dans un précédent article, je vous avais présenté BorgBackup et comment l'utiliser pour effectuer des sauvegardes sur un disque local. Aujourd'hui, je vais vous expliquer comment effectuer les sauvegardes sur une machine distante via SSH et comment sécuriser et automatiser tout ça.
Experience hassle-free SSH sessions. Follow our guide to keep your connections alive and eliminate freezing troubles.
In remote server management and secure data transfer, SSH (Secure Shell) stands as an indispensable tool. However, its convenience and security can sometimes be marred by a common frustration: frozen SSH sessions.
Apprenez à utiliser FFmpeg afin de pouvoir manipuler des fichiers vidéo et audio (décoder, encoder, transcoder, multiplexer, démultiplexer…) !
Create a custom PS1 variable for your Bash
Tired of typing the same sentences over and over?
Discover the incredible power of a full-blown text expander.
Kobalt - Espanso, l’utilitaire indispensable qui vous facilite la vie :
Il permet d’éviter de taper les mêmes mots ou phrases encore et encore, et de simplifier cela (et de gagner du temps) en écrivant les choses que vous tapez régulièrement grâce à seulement quelques frappes de clavier. Cela peut être très pratique si vous écrivez souvent les mêmes mots ou expressions dans des mails, pour votre travail, lorsque vous codez, etc.
On trouvera dans ce chapitre une initiation pratique au scripting Bash.
Les sections qui suivent dans ce chapitre s’inspirent notamment du livre Scripts shell Linux et Unix de Christophe Blaess qu’il est conseillé d’acquérir. L’ouvrage est orienté embarqué mais convient parfaitement pour un apprentissage précis, rapide, intéressant et dynamique.
This document presents various ways of annotating a large image with either text or some other image. The annotation may be bold and highly visible, or subtle and hidden.
Reasons for annotating images are varied, but are usually either to
- Mark the image with information about what the image is about.
- Point out or highlight some aspect of the image.
- Add copyright or logos to the image as a form of copy protection.
Aujourd’hui, toutes les applications et les infrastructures ont besoin de manipuler des paramètres sensibles pour pouvoir effectuer des appels API, se connecter aux bases de données, ou se connecter à d’autres services. Stocker et rendre ces paramètres sensibles accessibles de manière sécurisée est un des enjeux majeurs de nos métiers aujourd’hui.
Il existe de nombreuses solutions sur le marché. Certaines managées, comme Secret Manager sur AWS et GCP. Ou bien, des solutions open source, comme Vault by HashiCorp.
Dans le cadre de cet article, nous allons nous intéresser à ce dernier outil, extrêmement populaire et très utilisé.
Mise à jours en 07/2023 de mon installation d'Arch Linux avec quelques nouveautés en particulier la prise en charge de snapshot avec BTRFS, modification container luks2, ajout kernel linux-zen, bureau hyprland.
Voila sur quoi je travail sur ma nouvelle installation d'Arch Linux en mode dev dans une VM sous Proxmox, avant de déployer sur mon thinkpad Helix. Tout fonctionne pour l'instant jusqu'à l'installation du bureau hyprland.
This wonderful website, made with ❤ by Corentin Thomasset , aggregates useful tools for developer and people working in IT. If you find it useful, please feel free to share it to people you think may find it useful too and don't forget to bookmark it in your shortcut bar!
IT Tools is open-source (under the MIT license) and free, and will always be, but it costs me money to host and renew the domain name. If you want to support my work, and encourage me to add more tools, please consider supporting by sponsoring me .
Are you planning to upgrade to the latest release of Debian 12 (codenamed “Bookworm”), from Debian 11? But did you know that instead of downloading the Debian 12 ISO file and installing it, you can simply upgrade your existing Debian 11 to Debian 12 by following a few steps? Yes, you heard right.
In this blog, we will discuss the simple procedure of upgrading Debian 11 to Debian 12.
Vous trouverez un guide d'emploi de cette commande, raisonnablement clair, détaillé, bourré d'exemples - malheureusement en anglais - à la page Learn the dd command.
Wizard zines focuses on fundamentals: things that haven’t changed much in the last 10 years and that probably won’t change much in the next 10 either. That’s why there’s a zine about HTTP and not, say, the Python requests module. HTTP/1.1 was defined in 1997! The basics haven’t changed since 1997 because we need backwards compatibility on the web!