Telegram Web Link
SSH Tunneling
@uselinux
In SSH tunneling, an encrypted channel is created between an ssh client and an ssh server. Information flowing within the encrypted tunnel is secure and thus cannot be intercepted. This type of service is in particular used when running insecure protocols such as TightVNC. They can also be used to access internal networks and services running on them, bypass firewalls, as VPNs and as backdoors.
@uselinux

source
The Linux Rain; By Kalyani Rajalingham
(Posted by eldersnake on Jun 22, 2020 4:38 PM EDT)

#auto_post
‘Mirai’ botnet successors’ co-developer sentenced to 13 months
@uselinux
A 21-year-old man has been sentenced to serve 13 months in federal prison for his role in creating the Satori DDoS botnet, which descended from Mirai IoT malware, announced U.S. Attorney Bryan Schroder in Anchorage, Alaska. Kenneth Currin Schuchman, 22, of Vancouver, Wash., was sentenced today by Chief U.S. District Judge Timothy M. Burgess, after…
@uselinux

source
June 30, 2020
#auto_post
Report: Lazarus Group has large-scale Covid-19 phishing campaign in the works
@uselinux
North Korea’s Lazarus group is likely behind a planned coronavirus-related phishing campaign taking aim at more than 5 million businesses and people in the U.S. and five other countries June 21. “The hacking campaign involved using phishing emails under the guise of local authorities in charge of dispensing government-funded Covid-19 support initiatives,” researchers at Cyfirma…
@uselinux

source
June 19, 2020
#auto_post
Manage your Kubernetes cluster with Lens
@uselinux
As more workloads are migrated to containerized environments, it becomes challenging to manage those larger numbers of containers and the connections between them and other systems. As the scale and complexity of a containerized environment increase past a human's ability to manage, container orchestration platforms such as Kubernetes become increasingly important.
@uselinux

source
Opensource.com; By Chris Collins
(Posted by bob on Jun 25, 2020 7:39 AM EDT)

#auto_post
Event invitation phishing scheme usurps efficacy of Microsoft, Google and Wells Fargo
@uselinux
A phishing campaign in multiple enterprise email environments purportedly protected by Proofpoint and Microsoft entices users with false event invitations in the form of .ics calendar invite attachments, Cofense Phishing Defense Center (PDC) reported. The convoluted scheme dupes recipients into thinking their bank accounts have been compromised, even though the ruse’s initial focus is stuffing…
@uselinux

source
June 29, 2020
#auto_post
NetWalker claims credit for attack on Crozer-Keystone Health System
@uselinux
The NetWalker ransomware group claimed to be behind an attack on Philadelphia area Crozer-Keystone Health System, prompting the health care provider to take systems offline. The hackers are threatening to begin releasing information nicked in the attack in six days, according to a Cyberscoop report. The company, which operates eight medical facilities, including four hospitals,…
@uselinux

source
June 19, 2020
#auto_post
بدون شرح...😐
@UseLinux
#Fun
source: sec_nerd
هر سال در آخرین جمعه جولای، روز جهانی مدیران سیستم است. روز تقدیر از کسانی که سیستم های کامپیوتری ما رو بالا نگه می‌دارن و باعث می‌شن جهان مدرن ما کار کنه. اگر شما جزوشون هستین دستتون درد نکنه و اگر نیستین، از یکیشون (به جز من!-جادی) تشکر کنین که ذوق کنه (:

https://jadi.net/2020/07/sysadmin-day-2020/

@UseLinux
LibreOffice 6.4.5 Released with over 100 Bug Fixes, Now Ready for Enterprise Deployments
@uselinux
The Document Foundation announced today the general availability LibreOffice 6.4.5 as the fifth of seven maintenance updates to the latest LibreOffice 6.4 office suite series.
@uselinux

source
9to5Linux; By Marius Nestor
(Posted by hanuca on Jul 3, 2020 3:20 AM EDT)

#auto_post
Mobile ransomware disguised as upcoming Canadian Covid-19 contact tracing app
@uselinux
Capitalizing on a Canadian government announcement pertaining to the development of a nationwide, voluntary Covid-19 contact tracing app, malicious actors this month created a fake version of such an app that in reality infects Android users with mobile ransomware. According to a new blog post from ESET, the ransomware, dubbed CryCryptor, was found being distributed…
@uselinux

source
June 25, 2020
#auto_post
Linux Mint 20 has Released! Take a first look at it's New Features
@uselinux
Linux Mint 20 has released. We take it on a ride to show you what it looks like and the new feature it brings.
@uselinux

source
It's FOSS Youtube channel; By Ankush Das
(Posted by abhishekpc on Jun 29, 2020 10:48 PM EDT)

#auto_post
Linux Ending Support for the Floppy Drive, Unity 2019.2 Launches Today, Purism Unveils Final Librem 5 Smartphone Specs, First Kernel Security Update for Debian 10 "Buster" Is Out, and Twitter Is Switching from Mesos to Kubernetes
@uselinux
News briefs for July 30, 2019
@uselinux

source
Jill Franklin
- July 30, 2019

#auto_post
هاه. مثل اینکه اگر توی #اینستاگرام برین روی اکانت
wn.v7
و فالووینگ‌هاش رو نگاه کنین، اپ یا حتی تب براوزر شما کرش می کنه (:

خطری نداره ولی بامزه است. احتمالا یه کاراکتری یا ترکیبی در یکی از یوزرها هست که مشکل درست می‌کنه.
https://instagram.com/wn.v7

توجهتونو به تعداد پستاشم جلب میکنم:/

@UseLinux
(جادی)
An introduction to the Linux /etc/fstab file
@uselinux
For all of the improvements made, there are still "old school" pieces of the puzzle that we simply can't live without. Filesystems, and by necessity, filesystem tables, are one of these constants. These can be a bit tricky for a lot of users, so we will look at /etc/fstab (fstab) a little closer. Explore the Linux file system table and some configuration basics.
@uselinux

source
Enable SysAdmin; By Tyler Carrigan
(Posted by enable-sysadmin on Jun 20, 2020 4:07 PM EDT)

#auto_post
Linux at Home: Embroidery design
@uselinux
With more time at home, there’s never a better opportunity to embark on a new hobby. How about embroidery? Learning embroidery doesn’t have to be complicated, and it definitely shouldn’t feel like a huge investment of time and money. It’s actually an easy and inexpensive hobby. And there’s good free and open source software available that helps a lot with creating and modifying embroidery designs.
@uselinux

source
LinuxLinks.com; By LinuxLinks
(Posted by sde on Jun 26, 2020 11:57 PM EDT)

#auto_post
How to run Skopeo in a container
@uselinux
Using Skopeo to work with remote container registries, securely handle authentication, and access the host's container storage.
@uselinux

source
Enable SysAdmin; By Valentin Rothberg
(Posted by enable-sysadmin on Jun 28, 2020 3:32 AM EDT)

#auto_post
How To Print Files Without Comments And Empty Lines In Linux
@uselinux
Ever wanted to exclude or ignore comments and empty lines from a file output? This guide explains how to print files without comments and empty lines in Linux.
@uselinux

source
ostechnix.com
(Posted by ostechnix on Jul 1, 2020 3:54 AM EDT)
#auto_post
How to Install Ubuntu on Raspberry Pi
@uselinux
With the release of the Raspberry Pi Imager tool, it is now very easy to install Ubuntu on Raspberry Pi. This tutorial shows you how.
@uselinux

source
Make Tech Easier; By Jessica Thornsby
(Posted by damien on Jul 3, 2020 8:09 AM EDT)

#auto_post
Five Favorite Xfce Panel Applets
@uselinux
Here you go, it’s both a bit of a tutorial on how to use Xfce’s panel applets, as well as something of an in-depth look at five of our writer’s favorites.
@uselinux

source
FOSS Force; By Christine Hall
(Posted by brideoflinux on Jun 29, 2020 7:43 PM EDT)

#auto_post
How to assess user activity in Linux
@uselinux
If you’re managing a Linux server, it’s good to be ready with a number of commands that you can use to check user activity – when your users are logging in and how often, what groups they belong to, how much disk space they’re consuming, what command they're running, how much disk space they're occupying, if they’re reading their mail and more. Here are some commands to help you do that.
@uselinux

source
Network World; By Sandra Henry-Stocker
(Posted by MDavidson6785 on Jun 25, 2020 6:09 PM EDT)

#auto_post
2025/07/06 06:24:02
Back to Top
HTML Embed Code: