Showing headlines posted by linuxer

« Previous ( 1 ... 15 16 17 18 19 20 21 22 23 24 25 ... 27 ) Next »

Python Exception Handling

Python will let you know when you get your syntax wrong. It'll immediately fail and not allow your program to run. What about when your code has a different type of problem? Those are called exceptions, and they tend to be harder to catch. It's up to you to recognize situations where hey might come up and catch them to prevent your program from crashing altogether.

Test And Recover Your Passwords By Cracking Them With Hashcat

Hashcat is a robust password cracking tool that can help you recover lost passwords, audit password security, benchmark, or just figure out what data is stored in a hash. There are a number of great password cracking utilities out there, but Hashcat is known for being efficient, powerful, and full featured. Hashcat makes use of GPUs to accelerate hash cracking. GPUs are much better and handling cryptographic work than CPUs are, and they can be utilized in much greater numbers than CPUs.

Encrypt Your Email With GPG, Thunderbird, and Enigmail

Encrypting everything online is becoming more important by the day. Email is no different. For Linux users, the process is actually very simple with three common open source tools; Mozilla Thunderbird, Enigmail, and GNU PGP(GPG.) Through the use of these three tools, you can send and receive encrypted messages easily, and protect yourself and the people you're communicating with from attackers and privacy invasions.

Protect Your Online Privacy With The Tor Browser Bundle

For anyone looking to protect their privacy online, Tor is an invaluable tool. It is both one of the most reliable ways to hide your identity and one of the easiest to use. There are multiple different ways to use Tor, but the simplest and quickest is the Tor Browser bundle. It is a self-contained Tor installation coupled with a specially configured Firefox installation designed to get you up an running with as few hassles and as little configuration as possible.

Python Inheritance

Inheritance is yet another key concept in Object Oriented Programming, and it plays a vital role in building classes. It allows a class to be based off on an existing one. When you first started writing Python classes, you were told to just put "Object" in the parenthesis of the class definition and not think too much about it. Well, now's the time to start thinking about it.

How to perform a faster data compression with pbzip2

What if you would be able to perform a data compression four times faster, with the same compression ratio as you normally do. Pbzip2 command line utility can easily accomplish this as it gives you an option to select number CPU and amount of RAM to be used during the compression process.

Tweet From the Linux Command Line With Rainbow Stream

Rainbow Stream allows you to manage just about every aspect of your Twitter account from the command line. Yes, you did read that right. It's a full featured command line Twitter client written in Python. Chances are, you're falling into one of two camps right about now. If you're in the slightly insane one that thinks this is a good idea, stay tuned.

Test WordPress Logins With Hydra on Kali Linux

There are web forms all over the Internet. Even sites that don't usually allow regular users to log in probably have an admin area. It's important when running and deploying a site to make sure that the passwords gating access to sensitive controls and admin panels are as secure as possible.

SSH Password Testing With Hydra on Kali Linux

Hail Hydra! Okay, so we're not talking about the Marvel villains here, but we are talking about a tool that can definitely do some damage. Hydra is a popular tool for launching brute force attacks on login credentials.

Creating Wordlists with Crunch on Kali Linux

Wordlists are a key part of brute force password attacks. For those readers that aren't familiar, a brute force password attack is an attack in which an attacker uses a script to repeatedly attempt to log into an account until they receive a positive result. Brute force attacks are fairly overt and can cause a properly configured server to lock out an attacker or their IP.

Basics of network protocol analyzer Wireshark On Linux

Wireshark is just one of the valuable tools provided by Kali Linux. Like the others, it can be used for either positive or negative purposes. Of course, this guide will cover monitoring your own network traffic to detect any potentially unwanted activity.

Hosting Django With Nginx and Gunicorn on Linux

Hosting Django web applications is fairly simple, though it can get more complex than a standard PHP application. There are a few ways to handle making Django interface with a web server. Gunicorn is easily one of the simplest.

Record and Replay Terminal Session with Asciinema on Linux

Asciinema is a lightweight and very efficient alternative to a Script terminal session recorder. It allows you to record, replay and share your JSON formatted terminal session recordings. The main advantage in comparison to desktop recorders such as Recordmydesktop, Simplescreenrecorder, Vokoscreen or Kazam is that Asciinema records all standard terminal input, output and error as a plain ASCII text with ANSI escape code.

Protecting Your Privacy With Firefox on Linux

Privacy and security are becoming increasingly important topics. Though it's impossible to be 100% secure, there are measures that you can take, especially on Linux, to help defend your online privacy and security when browsing the web.

Generate SSL Certificates With LetsEncrypt Debian Linux

In case you haven't realized already, encryption is important. For the web, that means using SSL certificates to secure web traffic. Recently, Mozilla and Google have gone as far as to mark sites without SSL certificates as insecure in Firefox and Chrome. In order to bring the Web up to speed with encryption, the Linux Foundation along with the Electronic Frontier Foundation and many others created LetsEncrypt.

How to change MAC address using macchanger on Kali Linux

The objective is to change or fake an original network card's hardware MAC address. The following article will show how to change MAC address using macchanger on Kali Linux.

How to install or upgrade to PHP 7 on CentOS 7 Linux Server

The objective is to install or replace existing PHP 5 with PHP 7 on CentOS 7 Linux server. As you will see, this procedure is fairly simple when using Remi Repository.

Installation of the latest bleeding edge PHP 7 on Debian 8 Jessie Linux

Debian's current stable package repository may not always contain an up to date software to be in line with our expectations. There is a very good reason for this, such as a stable system as a trade-off for running bleeding edge software. The current PHP developer's claims put PHP 7 in front of PHP 5.6 in terms of speed, where PHP 7 is supposed to be as twice as fast as its predecessor.

How to install kannel sms gateway on Debian Linux for nagios SMS notificationsSMS

  • linuxconfig.org; By Essodjolo Kahanam (Posted by linuxer on Jan 1, 2017 6:18 PM EDT)
  • Story Type: Tutorial; Groups: Debian, Linux
In this article, you will learn how to install kannel server on Debian and integrate it to a Nagios server for sms notifications. We asume that the reader already has a working Nagios server and we will focus on Kannel installation and its integration with Nagios.

Simple way for unattended bulk user creation in Linux

  • linuxconfig.org; By Essodjolo Kahanam (Posted by linuxer on Dec 30, 2016 1:40 AM EDT)
  • Story Type: Tutorial; Groups: Linux
As a Linux system administrator, you will sometimes have to add new user account to your system. To do so, adduser command is often used. When it comes to multiple users' creation, adduser command may become boring and time-consuming. This short article intends to provide the Linux system administrator with a simple and unattended way for bulk user creation. The newusers command will help you to create multiple users by getting their info from a prefilled file.

« Previous ( 1 ... 15 16 17 18 19 20 21 22 23 24 25 ... 27 ) Next »