901 private links
Physically sharing computers with other people can be a challenge. While they only need temporary access to access the web, work on some files or even play a game, this may impose a security risk. For example, your personal files may be accessible because your account is already logged in. While on one hand you want to share your device, on another hand you may also want to some privacy.
If this is a concern for you, keep reading. We will see how to use guest accounts on Linux Mint and how to customize them for your needs.
If you’ve dual-booted Linux with another operating system like Windows and are stuck with the traditional GRUB boot manager, it’s time to switch to rEFInd, IMMEDIATELY!
This tutorial shows how to automatically create, delete files/folders, and/or write parameters into config files at startup in Ubuntu and other Linux using systemd.
This can be useful if some configuration do not persistent and reset to default on every boot, or you want to clean up something either on every boot or after every time period.
Pilote générique PCL 6 pour Linux
Learn how to monitor a directory recursively and execute a command whenever the files and directories within it change.
f3 is a simple tool that tests flash cards capacity and performance to see if they live up to claimed specifications. It fills the device with pseudorandom data and then checks if it returns the same on reading.
F3 stands for Fight Flash Fraud, or Fight Fake Flash.
How do I capture a specific protocol or port, such as 80 (HTTP) or 443 (HTTPS), using the TCPDump tool under Linux/UNIX? How do I record traffic with TCPDump and find problems later on with my network or server issues? Let’s dive into the nitty-gritty of capturing and analyzing your network traffic for trapshooting network and server issues.
The next generation Linux workstation, designed for reliability, performance, and sustainability.
Bluefin Administration Guide - Bluefin and Aurora - Universal Blue
rpm-ostree rebase ostree-image-signed:docker://ghcr.io/ublue-os/bluefin:latest
Iptables is a firewall that plays an essential role in network security for most Linux systems. While many iptables tutorials will teach you how to create firewall rules to secure your server, this one will focus on a different aspect of firewall management: listing and deleting rules.
In this tutorial, we will cover how to do the following iptables tasks:
- List rules
- Clear Packet and Byte Counters
- Delete rules
- Flush chains (delete all rules in a chain)
- Flush all chains and tables, delete all chains, and accept all traffic
Documentation basée sur BookStack.
just
is a handy way to save and run project-specific commands.
Bringing the console gaming experience to PC
Bazzite is a custom image built on Fedora Atomic technology that brings the best of Linux gaming to all of your devices (yep, even your favorite handheld).
Nmap is short for Network Mapper. It is an open-source security tool for network exploration, security scanning, and auditing. However, the Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. The purpose of this guide is to introduce a user to the Nmap command line tool to scan a host or network to find out the possible vulnerable points in the hosts. You will also learn how to use Nmap for offensive and defensive purposes. Let us see some common and practial nmap examples running on Linux or Unix-like systems.
Modern UNIX shells like bash (default on Linux) and zsh (default on macOS) keep a history of all the commands you enter. The easiest way to access this history is by pressing the up and down cursor keys to browse through the last commands.
But this is only the tip of the iceberg. There are many more powerful history features that are easy to overlook. Learning them and making them second nature will help you to become much faster with a shell.
Exegol is a community-driven hacking environment, powerful and yet simple enough to be used by anyone in day to day engagements. Exegol is the best solution to deploy powerful hacking environments securely, easily, professionally. No more unstable, not-so-security-focused systems lacking major offensive tools. Kali Linux (and similar alternatives) are great toolboxes for learners, students and junior pentesters. But professionals have different needs, and their context require a whole new design.
Chaque minute, nombreuses sont les tentatives d'intrusion sur l'ensemble des ordinateurs connectées à Internet.
Parmi les attaques les plus virulentes, il y a bien sûr les tentatives d'accès SSH, l'exploitation de failles de sécurité sur des services Web (Wordpress, PhpMyAdmin ...) et l'exploitation des failles de sécurité sur des services contenant des failles de sécurité connues : services SMB (139), service RDP(3389), service Docker(2376), bases MongoDB ... Ces tentatives d'attaques sont pour la majorité automatisées depuis des serveurs eux-mêmes vulnérables.
Your ultimate guide to cron jobs and crontab on Linux. From basics to advanced tips, learn everything you need for scheduling success.
La documentation du projet SambaÉdu
SambaÉdu est une solution de serveur pédagogique libre basé sur GNU/Linux (Debian).
Développée par des enseignants pour les enseignants et leurs élèves, cette solution logicielle permet de gérer simplement et efficacement le parc informatique d’un établissement scolaire composé de clients hétérogènes (Windows et GNU/Linux).
Elle utilise des technologies libres et open-source : Samba, Apache, PHP, MySQL, iPXE.
A Unix history's diagram