SSH Tunneling
@uselinux
@uselinux
source
The Linux Rain; By Kalyani Rajalingham
(Posted by eldersnake on Jun 22, 2020 4:38 PM EDT)
#auto_post
@uselinux
In SSH tunneling, an encrypted channel is created between an ssh client and an ssh server. Information flowing within the encrypted tunnel is secure and thus cannot be intercepted. This type of service is in particular used when running insecure protocols such as TightVNC. They can also be used to access internal networks and services running on them, bypass firewalls, as VPNs and as backdoors.
@uselinux
source
The Linux Rain; By Kalyani Rajalingham
(Posted by eldersnake on Jun 22, 2020 4:38 PM EDT)
#auto_post
‘Mirai’ botnet successors’ co-developer sentenced to 13 months
@uselinux
@uselinux
source
June 30, 2020
#auto_post
@uselinux
A 21-year-old man has been sentenced to serve 13 months in federal prison for his role in creating the Satori DDoS botnet, which descended from Mirai IoT malware, announced U.S. Attorney Bryan Schroder in Anchorage, Alaska. Kenneth Currin Schuchman, 22, of Vancouver, Wash., was sentenced today by Chief U.S. District Judge Timothy M. Burgess, after…
@uselinux
source
June 30, 2020
#auto_post
SC Media
‘Mirai’ botnet successors’ co-developer sentenced to 13 months | SC Media
A 21-year-old man has been sentenced to serve 13 months in federal prison for his role in creating the Satori DDoS botnet, which descended from Mirai IoT
Report: Lazarus Group has large-scale Covid-19 phishing campaign in the works
@uselinux
@uselinux
source
June 19, 2020
#auto_post
@uselinux
North Korea’s Lazarus group is likely behind a planned coronavirus-related phishing campaign taking aim at more than 5 million businesses and people in the U.S. and five other countries June 21. “The hacking campaign involved using phishing emails under the guise of local authorities in charge of dispensing government-funded Covid-19 support initiatives,” researchers at Cyfirma…
@uselinux
source
June 19, 2020
#auto_post
SC Media
Report: Lazarus Group has large-scale Covid-19 phishing campaign in the works | SC Media
North Korea’s Lazarus group is likely behind a planned coronavirus-related phishing campaign taking aim at more than 5 million businesses and people in
Manage your Kubernetes cluster with Lens
@uselinux
@uselinux
source
Opensource.com; By Chris Collins
(Posted by bob on Jun 25, 2020 7:39 AM EDT)
#auto_post
@uselinux
As more workloads are migrated to containerized environments, it becomes challenging to manage those larger numbers of containers and the connections between them and other systems. As the scale and complexity of a containerized environment increase past a human's ability to manage, container orchestration platforms such as Kubernetes become increasingly important.
@uselinux
source
Opensource.com; By Chris Collins
(Posted by bob on Jun 25, 2020 7:39 AM EDT)
#auto_post
Event invitation phishing scheme usurps efficacy of Microsoft, Google and Wells Fargo
@uselinux
@uselinux
source
June 29, 2020
#auto_post
@uselinux
A phishing campaign in multiple enterprise email environments purportedly protected by Proofpoint and Microsoft entices users with false event invitations in the form of .ics calendar invite attachments, Cofense Phishing Defense Center (PDC) reported. The convoluted scheme dupes recipients into thinking their bank accounts have been compromised, even though the ruse’s initial focus is stuffing…
@uselinux
source
June 29, 2020
#auto_post
SC Media
Event invitation phishing scheme usurps efficacy of Microsoft, Google and Wells Fargo | SC Media
A phishing campaign in multiple enterprise email environments purportedly protected by Proofpoint and Microsoft entices users with false event invitations
NetWalker claims credit for attack on Crozer-Keystone Health System
@uselinux
@uselinux
source
June 19, 2020
#auto_post
@uselinux
The NetWalker ransomware group claimed to be behind an attack on Philadelphia area Crozer-Keystone Health System, prompting the health care provider to take systems offline. The hackers are threatening to begin releasing information nicked in the attack in six days, according to a Cyberscoop report. The company, which operates eight medical facilities, including four hospitals,…
@uselinux
source
June 19, 2020
#auto_post
SC Media
NetWalker claims credit for attack on Crozer-Keystone Health System | SC Media
The NetWalker ransomware group claimed to be behind an attack on Philadelphia area Crozer-Keystone Health System, prompting the health care provider to
هر سال در آخرین جمعه جولای، روز جهانی مدیران سیستم است. روز تقدیر از کسانی که سیستم های کامپیوتری ما رو بالا نگه میدارن و باعث میشن جهان مدرن ما کار کنه. اگر شما جزوشون هستین دستتون درد نکنه و اگر نیستین، از یکیشون (به جز من!-جادی) تشکر کنین که ذوق کنه (:
https://jadi.net/2020/07/sysadmin-day-2020/
@UseLinux
https://jadi.net/2020/07/sysadmin-day-2020/
@UseLinux
جادی دات نت | کیبرد آزاد
روز جهانی مدیران سیستم ۲۰۲۰ مبارک
بازم رسیدیم به آخرین جمعه جولای و روز جهانی مدیران سیستم. به افتخار همه کسانی که سیستمها رو بالا نگه میدارن. به افتخار همه کسانی که سیستم عاملها رو میفهمن و به افتخار همه کسانی که باعث شدن شما بتونین اینو روی اینترنت بخونین – بخصوص اونهایی که با فیلترینگ…
LibreOffice 6.4.5 Released with over 100 Bug Fixes, Now Ready for Enterprise Deployments
@uselinux
@uselinux
source
9to5Linux; By Marius Nestor
(Posted by hanuca on Jul 3, 2020 3:20 AM EDT)
#auto_post
@uselinux
The Document Foundation announced today the general availability LibreOffice 6.4.5 as the fifth of seven maintenance updates to the latest LibreOffice 6.4 office suite series.
@uselinux
source
9to5Linux; By Marius Nestor
(Posted by hanuca on Jul 3, 2020 3:20 AM EDT)
#auto_post
9to5Linux
LibreOffice 6.4.5 Released with over 100 Bug Fixes, Now Ready for Enterprise Deployments - 9to5Linux
LibreOffice 6.4.5 office suite arrives with more than 100 bug fixes and green light for enterprise deployments in production environments.
Mobile ransomware disguised as upcoming Canadian Covid-19 contact tracing app
@uselinux
@uselinux
source
June 25, 2020
#auto_post
@uselinux
Capitalizing on a Canadian government announcement pertaining to the development of a nationwide, voluntary Covid-19 contact tracing app, malicious actors this month created a fake version of such an app that in reality infects Android users with mobile ransomware. According to a new blog post from ESET, the ransomware, dubbed CryCryptor, was found being distributed…
@uselinux
source
June 25, 2020
#auto_post
SC Media
Mobile ransomware disguised as upcoming Canadian Covid-19 app
Malicious actors this month disguised an Android ransomware program called CryCryptor as a Canadian Covid-19 contact tracing app.
Linux Mint 20 has Released! Take a first look at it's New Features
@uselinux
@uselinux
source
It's FOSS Youtube channel; By Ankush Das
(Posted by abhishekpc on Jun 29, 2020 10:48 PM EDT)
#auto_post
@uselinux
Linux Mint 20 has released. We take it on a ride to show you what it looks like and the new feature it brings.
@uselinux
source
It's FOSS Youtube channel; By Ankush Das
(Posted by abhishekpc on Jun 29, 2020 10:48 PM EDT)
#auto_post
Linux Ending Support for the Floppy Drive, Unity 2019.2 Launches Today, Purism Unveils Final Librem 5 Smartphone Specs, First Kernel Security Update for Debian 10 "Buster" Is Out, and Twitter Is Switching from Mesos to Kubernetes
@uselinux
@uselinux
source
Jill Franklin
- July 30, 2019
#auto_post
@uselinux
News briefs for July 30, 2019
@uselinux
source
Jill Franklin
- July 30, 2019
#auto_post
هاه. مثل اینکه اگر توی #اینستاگرام برین روی اکانت
wn.v7
و فالووینگهاش رو نگاه کنین، اپ یا حتی تب براوزر شما کرش می کنه (:
خطری نداره ولی بامزه است. احتمالا یه کاراکتری یا ترکیبی در یکی از یوزرها هست که مشکل درست میکنه.
https://instagram.com/wn.v7
توجهتونو به تعداد پستاشم جلب میکنم:/
@UseLinux
(جادی)
wn.v7
و فالووینگهاش رو نگاه کنین، اپ یا حتی تب براوزر شما کرش می کنه (:
خطری نداره ولی بامزه است. احتمالا یه کاراکتری یا ترکیبی در یکی از یوزرها هست که مشکل درست میکنه.
https://instagram.com/wn.v7
توجهتونو به تعداد پستاشم جلب میکنم:/
@UseLinux
(جادی)
An introduction to the Linux /etc/fstab file
@uselinux
@uselinux
source
Enable SysAdmin; By Tyler Carrigan
(Posted by enable-sysadmin on Jun 20, 2020 4:07 PM EDT)
#auto_post
@uselinux
For all of the improvements made, there are still "old school" pieces of the puzzle that we simply can't live without. Filesystems, and by necessity, filesystem tables, are one of these constants. These can be a bit tricky for a lot of users, so we will look at /etc/fstab (fstab) a little closer. Explore the Linux file system table and some configuration basics.
@uselinux
source
Enable SysAdmin; By Tyler Carrigan
(Posted by enable-sysadmin on Jun 20, 2020 4:07 PM EDT)
#auto_post
Enable Sysadmin
An introduction to the Linux /etc/fstab file
Explore the Linux file system table and some configuration basics.
Linux at Home: Embroidery design
@uselinux
@uselinux
source
LinuxLinks.com; By LinuxLinks
(Posted by sde on Jun 26, 2020 11:57 PM EDT)
#auto_post
@uselinux
With more time at home, there’s never a better opportunity to embark on a new hobby. How about embroidery? Learning embroidery doesn’t have to be complicated, and it definitely shouldn’t feel like a huge investment of time and money. It’s actually an easy and inexpensive hobby. And there’s good free and open source software available that helps a lot with creating and modifying embroidery designs.
@uselinux
source
LinuxLinks.com; By LinuxLinks
(Posted by sde on Jun 26, 2020 11:57 PM EDT)
#auto_post
LinuxLinks
Linux at Home: Embroidery design - LinuxLinks
John looks at embroidery software. Embroidery is the craft of decorating fabric or other materials using a needle to apply thread or yarn.
How to run Skopeo in a container
@uselinux
@uselinux
source
Enable SysAdmin; By Valentin Rothberg
(Posted by enable-sysadmin on Jun 28, 2020 3:32 AM EDT)
#auto_post
@uselinux
Using Skopeo to work with remote container registries, securely handle authentication, and access the host's container storage.
@uselinux
source
Enable SysAdmin; By Valentin Rothberg
(Posted by enable-sysadmin on Jun 28, 2020 3:32 AM EDT)
#auto_post
Enable Sysadmin
How to run Skopeo in a container
Using Skopeo to work with remote container registries, securely handle authentication, and access the host's container storage.
How To Print Files Without Comments And Empty Lines In Linux
@uselinux
@uselinux
source
ostechnix.com
(Posted by ostechnix on Jul 1, 2020 3:54 AM EDT)
#auto_post
@uselinux
Ever wanted to exclude or ignore comments and empty lines from a file output? This guide explains how to print files without comments and empty lines in Linux.
@uselinux
source
ostechnix.com
(Posted by ostechnix on Jul 1, 2020 3:54 AM EDT)
#auto_post
OSTechNix
Print Files Without Comments And Empty Lines In Linux - OSTechNix
Ever wanted to exclude or ignore comments and empty lines from a file? This guide explains how to print files without comments and empty lines in Linux.
How to Install Ubuntu on Raspberry Pi
@uselinux
@uselinux
source
Make Tech Easier; By Jessica Thornsby
(Posted by damien on Jul 3, 2020 8:09 AM EDT)
#auto_post
@uselinux
With the release of the Raspberry Pi Imager tool, it is now very easy to install Ubuntu on Raspberry Pi. This tutorial shows you how.
@uselinux
source
Make Tech Easier; By Jessica Thornsby
(Posted by damien on Jul 3, 2020 8:09 AM EDT)
#auto_post
Make Tech Easier
How to Install Ubuntu on Raspberry Pi - Make Tech Easier
With the release of the Raspberry Pi Imager tool, it is now very easy to install Ubuntu on Raspberry Pi. This tutorial shows you how.
Five Favorite Xfce Panel Applets
@uselinux
@uselinux
source
FOSS Force; By Christine Hall
(Posted by brideoflinux on Jun 29, 2020 7:43 PM EDT)
#auto_post
@uselinux
Here you go, it’s both a bit of a tutorial on how to use Xfce’s panel applets, as well as something of an in-depth look at five of our writer’s favorites.
@uselinux
source
FOSS Force; By Christine Hall
(Posted by brideoflinux on Jun 29, 2020 7:43 PM EDT)
#auto_post
How to assess user activity in Linux
@uselinux
@uselinux
source
Network World; By Sandra Henry-Stocker
(Posted by MDavidson6785 on Jun 25, 2020 6:09 PM EDT)
#auto_post
@uselinux
If you’re managing a Linux server, it’s good to be ready with a number of commands that you can use to check user activity – when your users are logging in and how often, what groups they belong to, how much disk space they’re consuming, what command they're running, how much disk space they're occupying, if they’re reading their mail and more. Here are some commands to help you do that.
@uselinux
source
Network World; By Sandra Henry-Stocker
(Posted by MDavidson6785 on Jun 25, 2020 6:09 PM EDT)
#auto_post
Network World
How to assess user activity in Linux
In this post, we look at commands that Linux server admins can use to view user activity