Driftnet command tutorial and examples

Sniffing consists of intercepting packets through a network to get their content. When we share a network, intercepting the traffic going through it is pretty easy with a sniffer, that’s why protocol encryption such as...

13/02/2020 READ MORE

Comparison: Snap vs Flatpak vs AppImage

New packaging formats like Snap, Flatpak and AppImage are providing distribution agnostic packages that work on most Linux distributions. This solves packaging problems faced by app developers who want to distribute their...

13/02/2020 READ MORE

Where are the config files in GNOME

When you install a new distribution, you end up with a generic desktop. GNOME, when you choose standard Ubuntu. This works but the great joy of running Linux is to have it all your way. So, get your own tweaks in there....

13/02/2020 READ MORE

MariaDB Replication on RHEL 8/ CentOS 8

Disasters happen, and when they do, precious data can go with the wind, never again to be recovered, and when recovered, Companies usually spend up to millions of dollars to have it back and lose valuable time which could...

13/02/2020 READ MORE

Encrypting the hard disk or partitions

This tutorial shows how to encrypt hard disks and partitions using Cryptosetup with LUKS and how to encrypt and decrypt simple files using GPG and EncFS, all used tools are included on Debian standard installation by default. Encrypting...

13/02/2020 READ MORE

What happens when GNOME Starts

When you have GNOME installed, it is usually set up to run at boot. Your distribution has a standard desktop at your disposal. You can choose any other desktop, which is great after you have learned the tricks. If you choose...

13/02/2020 READ MORE

Disable Unnecessary Services Debian Linux

This article aims to help you increase performance and decrease vulnerabilities by reducing the number of services at minimal level as possible. By reducing the services instructed in this tutorial, domestic users who need...

13/02/2020 READ MORE

Debian Firewall Setup Best Practices for Security

Restrictive vs Permissive Firewall Policies In addition to the syntax you need to know to manage a firewall, you will need to define the firewall’s tasks to decide what policy will be implemented. There are 2 main policies...

13/02/2020 READ MORE

Understanding Debian Boot Process Step by Step

This article explains Debian Linux boot process step by step starting from the BIOS to the /sbin/init execution including the boot loader, init and init. The first software to be executed when you turn on your PC is the...

13/02/2020 READ MORE

Fully Managed VPS Fully Managed VPS Fully Managed VPS