Linux
-
Blog
Want a Really Lightweight Desktop Linux Experience? Try a Window Manager
Summary Window managers manage only windows in the X Window System, providing you an alternative to Linux desktop environments. Tiling and stacking window managers let you use your screen space efficiently. Popular window managers for Linux include Openbox, Fluxbox, awesome, and Enlightenment, each offering unique features. Many more are available in your Linux package manager. Find one you like! While…
Read More » -
Blog
Is Your SSD Failing? Learn to Check Its Health on Linux
If your data center makes use of Linux machines, one of the administrative tasks you’ll want to undertake is regularly checking the health of the SSD drives used on those machines. Why? Because, even though solid state drives will dramatically outlast rotating platter drives, they do have a finite lifespan. The last thing you want to do is fall victim…
Read More » -
Blog
Kali Linux 2024.4 released with 14 new tools, deprecates some features
Kali Linux has released version 2024.4, the fourth and final version of 2024, and it is now available with fourteen new tools, numerous improvements, and deprecates some features. Kali Linux is a distribution created for cybersecurity professionals and ethical hackers to perform penetration testing, ethical hacking, vulnerability research, security audits, and red team exercises. With this final release of 2024, the Kali…
Read More » -
Blog
Windows 10’s End Is Nigh. Now’s the Time to Get Used to Linux
Summary Free Windows 10 security updates will end in October 2025, and upgrading to Windows 11 may not be an option. Most Linux distros are user-friendly and free, and you can take your time getting used to it now without installing. Give Linux a try by testing distros in a browser, setting up a virtual machine, or using a Live…
Read More » -
Blog
New stealthy Pumakit Linux rootkit malware spotted in the wild
A new Linux rootkit malware called Pumakit has been discovered that uses stealth and advanced privilege escalation techniques to hide its presence on systems. The malware is a multi-component set that includes a dropper, memory-resident executables, a kernel module rootkit, and a shared object (SO) userland rootkit. Elastic Security discovered Pumakit in a suspicious binary (‘cron’) upload on VirusTotal, dated…
Read More » -
Blog
6 Tips for Using Linux Without Touching the Command Line
When you read about Linux, you probably see a lot of talk about commands to use in the terminal. The command line can seem intimidating if you aren’t used to it, which is understandable. But what if we told you you don’t have to worry about that? Can You Use Linux Without the Terminal? The short answer is yes—you can…
Read More » -
Blog
These 12 systemctl Commands Will Let You Take Control of Linux systemd Services
The systemctl command has some frequently overlooked functionality. In addition to starting and stopping Linux services, you can list the installed services, and check what state they’re in. Here’s a quick run-through. What Is the systemctl Command? The systemctl command is the central management tool for the systemd init system, probably best known as the tool used to start and…
Read More » -
Blog
How to Connect Windows to Linux Samba Shares Easily
When Windows 10 was released, it seemingly broke the ability to easily connect to Linux Samba shares. It appeared one could not write to a Linux share from Windows 10. Considering how many businesses rely on Samba to share folders, this was a bad move on Microsoft’s part. Fortunately, the ability to connect to Samba shares wasn’t actually removed from…
Read More » -
Blog
How to Add an SSH Fingerprint to Your known_hosts File in Linux
Let’s say you’ve written a bash script that scans all of your Linux servers in your data center for uptime. Such a file could contain the following contents: ssh $1 "uptime" When you run your script, it may get foiled by an issue where it is stopped by a server that has yet to have its SSH key fingerprint added…
Read More » -
Blog
BootKitty UEFI malware exploits LogoFAIL to infect Linux systems
The recently uncovered ‘Bootkitty’ Linux UEFI bootkit exploits the LogoFAIL flaw, tracked as CVE-2023-40238, to target computers running on vulnerable firmware. This is confirmed by firmware security firm Binarly, which discovered LogoFAIL in November 2023 and warned about its potential to be used in actual attacks. Bootkitty and LogoFAIL connection Bootkitty was discovered by ESET, who published a report last…
Read More »