Lucas Boullosa

47 Added | 2 Magazines | 76 Likes | 5 Following | 3 Followers | @Maelok | Keep up with Lucas Boullosa on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Lucas Boullosa”

Linux-tools/programs-to-install.sh at master · aaronfranke/Linux-tools

#!/bin/bash<p>sudo dpkg --add-architecture i386<p>sudo apt update<p>sudo apt upgrade -y<p>sudo apt dist-upgrade -y<p>sudo apt full-upgrade -y<p>wget …

Linux

Software Development in… Bash

Truly good ideas tend to apply in all situations. The phrase is “never run with scissors”, not “don’t run with scissors unless you are just going …

Test Driven Development

iftop – A Real Time Linux Network Bandwidth Monitoring Tool

In our earlier article, we have reviewed the usage of TOP Command and it’s parameters. In this article we have came up with another excellent program …

Linux

PowerShell Hardware Inventory Script

Scenario:<p>PowerShell hardware Inventory Script.<p>Have you ever wanted to have an inventory without the hassle of going to each finding the information …

Nintendo Switch Hacked To Run Linux

Hackers have been trying to hack the Nintendo Switch, it would now appear that one group has been successful and have managed to gain control of the …

How to setup automatic Hugo website generation and deployment with Git

Let’s say that you have tried Hugo, you liked it, and made a website with it.<p>Now you are ready to deploy that website for the <i>whole world</i> to …

How To: Use Kismet to Watch Wi-Fi User Activity Through Walls

Your home has walls for privacy, but Wi-Fi signals passing through them and can be detected up to a mile away with a directional Wi-Fi antenna and a …

How to use the nmcli command to gather network device information on Linux

If you're looking for a more efficient way to gather network device information on your Linux system, Jack Wallen shows you how to do just that with …

A Beginner's Guide to the GNOME Desktop

Of all the desktops available for the Linux operating system, GNOME has managed to become on of the most efficient, stable, and reliable—while still …

Hacking Tools List for Hackers & Security Professionals

Penetration testing & Hacking Tools Tools are more often used by security industries to test the vulnerabilities in network and applications. Here …

Information Security

How to Install Tripwire IDS (Intrusion Detection System) on Linux

Tripwire is a popular Linux Intrusion Detection System (IDS) that runs on systems in order to detect if unauthorized filesystem changes occurred over …

Linux

Get Computer Hacker Professional Certification Bundle (5-Courses)

Take a dive into professional computer hacking today, with more than 60 hours of preparation towards CISM (Certified Information Security Manager), …

Information Systems

Guider – A System Wide Linux Performance Analyzer

Guider is a free and opens source, powerful system-wide performance analysis tool written mostly in Python for Linux operating systems. It is …

Linux

How to Control Systemd Services on Remote Linux Server

Systemd system and services manager can be controlled using the systemctl command line utility. It enables you to manage systemd locally or on a …

Linux

Install/Setup MITRE Caldera the automated cyber adversary emulation system | HoldMyBeer

In this blog post I will be covering how to setup and utilize MITRE’s new tool called Caldera. Caldera is a cyber adversary emulation system that …

The Top 10 Open Source Distros You Haven't Heard About

As I have mentioned in previous articles, the open-source community is littered with many distributions – some of which you might never get to hear …

Linux

Kernel booting process. Part 6.

Introduction<p>This is the sixth part of the Kernel booting process series. In the previous part we have seen the end of the kernel boot process. But we …

Linux

20 Free Open Source Applications I Found in Year 2017

It is time to share a list of the best 20 Free and Open Source Software I found during the year 2017. Some of these programs may not be new in that …

Linux

Attacking Read-Only Domain Controllers (RODCs) to Own Active Directory

I have been fascinated with Read-Only Domain Controllers (RODCs) since RODC was released as a new DC promotion option with Windows Server 2008. …

Information Security

How to install the Prometheus monitoring system on Ubuntu 16.04

Mining data from your servers is crucial to understanding what's going on with your hardware and network. Jack Wallen shows you how to install a …

Linux

How To: Create a Native SSH Server on Your Windows 10 System

With the addition of the OpenSSH client and server in the Windows 10 Fall Creators Update, you no longer have to rely on third-party programs to open …

Linux

Linux Shell Scripting Tips

Share<p>From time to time one of my students will ask me to take a look at one of their shell scripts that they are having trouble with.<p>If you know …

Linux

Kali Linux on your Pocket: Kali 2017.3 on GPD 7 mini-laptop.

About teen weeks ago I bought a GPD Pocket 7 a mini-PC the size of a portable video game console that sports a quad-core Intel Z8750 CPU, 8Gb DDR3 …

Raspberry Pi

How To: Linux Basics for the Aspiring Hacker: Using Ship for Quick & Handy IP Address Information

Whether you're white hat, black hat, or some shade in-between, navigating through a network is a core part of hacking. To do that, we need to be able …

Linux

Download VMware vSphere

Product/Details<p>VMware vCenter Server Appliance<p><b>VMware vCenter Server Appliance</b> <br>File size: 3.31 GB <br>File type: iso<p>Read More<p>Name: …

Virtualization

How to Enable and Use Windows 10’s New Built-in SSH Commands

Microsoft announced it was bringing an integrated OpenSSH client to Windows in 2015. They’ve finally done it, and an SSH client is hidden in Windows …

Linux

How To: Use SSH Local Port Forwarding to Pivot into Restricted Networks

SSH is a powerful tool with more uses than simply logging into a server. This protocol, which stands for Secure Shell, provides X11 forwarding, port …

Linux

How to Use PowerShell Empire: Generating Stagers for Post Exploitation of Windows Hosts

PowerShell Empire is an amazing framework that is widely used by penetration testers for exploiting Microsoft Windows hosts. In our previous guide, …

Linux

A Shell Script to Send Email Alert When Memory Gets Low

A powerful aspect of Unix/Linux shell programs such as bash, is their amazing support for common programming constructs that enable you to make …

Linux

Video: How to Crack Weak Wi-Fi Passwords in Seconds with Airgeddon on Parrot OS

A weak password is one that is short, common, or easy to guess. Equally bad are secure but reused passwords that have been lost by negligent …

Linux