Ever had a problem creating a folder, application, file, etc shortcuts on your Linux desktop and end up not creating one at all? Good news! There is a way to get around that using a terminal program. In Linux, you create symbolic links or soft links to point to the linked file using this utility program called ln.
Imagine this scenario: you have files on your computer that you would much rather keep safe. Such files could contain sensitive data such as passwords and bank details. Keeping them on your computer is a convenient solution; however, if your computer was hacked or stolen, someone could easily access your files if your drive wasn’t encrypted. Passwords to unlock your PC are no object to someone who knows what they are doing, especially passwords that are ridiculously weak.
Everyone is talking about Meltdown and Spectre, the two security flaws found in Intel, AMD(less vulnerable) and ARM CPUs. Using the flaws attackers can read system memory which may have your passwords and other sensitive information. The worst part of it is that most systems are affected by it. So you're most likely affected by these flaws. Let's see how much an Internet surfer like you is affected by Meltdown.
Grep short for Global Regular Expression Print is a command line utility for searching lines in text based data to match a particular regular expression.
Dual booting Ubuntu and Arch Linux is not as easy as it sounds, however, I’ll make the process as easy as possible with much clarity. First, we will need to install Ubuntu then Arch Linux since it's much easier configuring the Ubuntu grub to be able to dual boot Ubuntu and Arch Linux.
I doubt there is a better alternative to Ookla’s speedtest when it comes to testing our internet speed. Once in a while, we all like to test our internet speed by visiting their website. Wouldn’t it be a lot cooler if we could test our internet speeds by using speedtest.net without having to visit their website right from the terminal?
If you are a regular Linux user, you must have encountered the term ‘Zombie Processes’. So what are the Zombie Processes? How do they get created? Are they harmful to the system? How do I kill these processes? Keep reading for the answers to all these questions.
If you’re a Linux user (which is likely if you’re a reader of this blog), you probably know that Linux dominates the server market. The servers that power the internet, store data backups, and stream your favorite online videos, are all highly likely to be running some flavor of Linux. While the usual flavor of choice for these ventures is typically Red Hat Enterprise Linux or it’s less expensive cousin CentOS, Ubuntu Server has also carved out its own territory in data centers around the world.
When it comes to penetration testing, hacking and offensive distros, one of the first to be mentioned is Kali Linux. It is based on Debian and is available in 32-bit and 64-bit editions. Today we take a look at installing Kali Linux. We will look at using the entire disk and installing alongside Windows.
Most Read Articles
Translate Our Site
Notice : Please be careful, after translation commands will change.
This website uses marketing and tracking technologies. Opting out of this will opt you out of all cookies, except for those needed to run the website. Note that some products may not work as well without tracking cookies.Opt Out of Cookies