Debian GNU/Linux version 7.0 Wheezy has been released ( jump to download ) after many months of constant development and available for download in various media format. Debian 7.0 is a free operating system includes various new features such as multiarch support, several specific tools to deploy private clouds, an improved installer, and a complete set of multimedia codecs and front-ends which remove the need for third-party repositories.
Kali Linux is the successor of the BackTrack Penetration Testing Linux distribution has been released. From the official project page:
Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools were reviewed and packaged, and we use Git for our VCS.
The nicstat command is top like utility for network interface card (NIC). It displays information and statistics about all your network card such as packets, kilobytes per second, average packet sizes and more. It works under Solaris and Linux operating systems.
In this post, I will explain how to install and use the nicstat command to find out stats about your NICs under Debian / Ubuntu / RHEL / CentOS Linux operating systems.
- How to serve your entire blog using cloudfront.
- DNS settings.
- Wordpress settings.
- Documenting limitations of cloudfront.
- Documenting performance improvements.
Geany is a great and light weight cross-platform integrated development environment for Linux and Unix based systems. It supports C, C++, Java, PHP, Python and 50+ other programming languages. Geany is known to run under Linux, FreeBSD, NetBSD, OpenBSD, MacOS X, AIX v5.3, Solaris Express and Windows. Geany more closely resembles programming editors available for Microsoft Windows such as Notepad++. So if, you are switching from MS-Windows to Ubuntu/Debian/Fedora/Mint or BSD/OS X/Unix like platform try geany IDE.
Nmap is short for Network Mapper. It is an open source security tool for network exploration, security scanning and auditing. However, nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users.
The purpose of this post is to introduce a user to the nmap command line tool to scan a host and/or network, so to find out the possible vulnerable points in the hosts. You will also learn how to use Nmap for offensive and defensive purposes.
Shutter is a free, open-source, and feature-rich screenshot tool for GNU/Linux distributions. I use this tool frequently when I am creating resources for this site or for our youtube channel and it has not yet let me down.
I carry my Linux powered laptop just about everywhere. How do I protect my private data stored on partition or removable storage media against bare-metal attacks where anyone can get their hands on my laptop or usb pen drive while traveling?
Worried about my data.
The pv command allows you to see the progress of data through a pipeline. It provides the following info:
- Time elapsed
- Percentage completed (with progress bar)
- Current throughput rate
- Total data transferred
Everything is a file under Linux and ls* and friends can help you to dig out more information from the system than you originally thought.