| by Scott Kilroy

4 ways to hide your identity using linux

Being able to change your IP address and other network information is a useful skill because it will help you access other networks while appearing as a trusted device on those networks. For example, in a denial­-of­-service (DoS) attack, you can spoof your IP so that that the attack appears to come from another source, […]

The post 4 ways to hide your identity using linux appeared first on The Linux Juggernaut.

Share Button
Read More
| by Arround The Web

Setting up a Basic File server Using simpleHTTPserver

Introduction In this article we will demonstrate a quick and easy method to use your local system as a basic File Server using simpleHTTPserver. The SimpleHTTPServer is a built in module that comes available with the default Python installation on a YUM based system. It is a simple HTTP server that provides standard GET and […]

The post Setting up a Basic File server Using simpleHTTPserver appeared first on The Linux Juggernaut.

Share Button
Read More
| by Arround The Web

Ansible playbook to replace multiple lines in a file

Introduction Commands like sed and awk allow us to harness the power of regular expressions to search for text-based patterns in files and manipulate the matched text as per our requirement. The thing about regular expressions is that they are confusing. To the new Linux user, regular expressions may as well be another language. Although […]

The post Ansible playbook to replace multiple lines in a file appeared first on The Linux Juggernaut.

Share Button
Read More
| by Arround The Web

Using Seashells to display terminal output to a web browser

Introduction Having the ability to display your terminal output to a web browser would be a neat feature to have. In this article, we will be discussing a tool named Seashells that does exactly that. Seashells lets you pipe output from command-line programs to the web in real-time, even without installing any new software on […]

The post Using Seashells to display terminal output to a web browser appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

How To Install Kali Linux in Virtualbox

In our previous article, we have discussed about how to download the kali linux image file and how to install virtualbox. Now let’s get you started with the virtual machine. Step 01 : Open Virtualbox VirtualBox should open once it has installed. Now you should be greeted by the VirtualBox Manager Step 02 : Create […]

The post How To Install Kali Linux in Virtualbox appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Kali Linux : The OS That Hackers Use

If you are familiar with cyber security stuff, you must have heard about kali linux. Kali linux is a operating system developed by offensive security and it was specifically targeted for penetration testers. This linux distribution is built on Debian and it comes pre installed with many more security tools. In this guide, we will […]

The post Kali Linux : The OS That Hackers Use appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

How to monitor user activity in Linux with Acct

Acct is an open source application that we can use to monitor user activity in Linux. This tool comes with the functionality of running in the background and tracking user activity. It also reports what are the system resources are being consumed by the users. In this guide, we will see how to install and […]

The post How to monitor user activity in Linux with Acct appeared first on The Linux Juggernaut.

Share Button
Read More
| by Arround The Web

Install and use pip for python package management in Linux

Introduction Python is one of the most popular scripting languages in use today and due to its wide user base and community support, it has thousands to of modules available which help to add to its existing functionality. The version of python that comes pre-installed with Linux distributions has some modules already available. Modules for […]

The post Install and use pip for python package management in Linux appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

SSH Command explained in 5 simple steps

Secure Shell (SSH) is a network protocol that is used to create a secure encrypted connection between 2 computer systems. Once the connection has been established, the user can do the following tasks on the remote system Execute commands on the server X11 tunneling Port forwarding, and more There are mainly 2 parties involved when […]

The post SSH Command explained in 5 simple steps appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Netstat : Master it with these 6 steps

Netstat is a command line utility that can be used to list out all the network connections on a system. It lists out all the tcp, udp socket connections and the unix socket connections. Netstat also displays various network related information such as network connections, routing tables, interface statistics, masquerade connections, multicast memberships etc. In this […]

The post Netstat : Master it with these 6 steps appeared first on The Linux Juggernaut.

Share Button
Read More
| by Arround The Web

npm package manager – install and use on Centos 7

Introduction Node.js is a Javascript platform for server-side programming that allows users to build network applications quickly. JavaScript is a client-side programming language, which means it’s processed within the user’s browser. With the advent of Node.js, JavaScript can also be used as a server-side language. By leveraging Javascript on both the front-end and the back-end, […]

The post npm package manager – install and use on Centos 7 appeared first on The Linux Juggernaut.

Share Button
Read More
| by Arround The Web

Understanding namespaces and cgroups in Linux

Introduction Namespaces and cgroups are the building blocks on which the foundation of containers has been laid. In this post, we will explore what are namespaces and cgroups along with brief descriptions of their various types.   What is a namespace? You may consider a namespace as a global system wrapper. It means it takes […]

The post Understanding namespaces and cgroups in Linux appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Netcat : The swiss Army knife You must have

Netcat (also known as ‘nc’) is a networking tool used for reading or writing from TCP and UDP sockets using an easy interface. It is designed as a dependable ‘back-end’ device that can be used directly or easily driven by other programs and scripts. Therefore, this tool is a treat to network administrators, programmers, and […]

The post Netcat : The swiss Army knife You must have appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Mtr : Stop using ping and traceroute anymore

In today’s guide, we are going to look at the mtr command and see what it can tells us about network connections.  Mtr is a simple linux command line tool that you can use for network diagnostic and troubleshooting in linux. It comes with the options of both ping and traceroute commands. Just like a […]

The post Mtr : Stop using ping and traceroute anymore appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

8 steps to check your network interface information

In a GUI, checking the state of a network interface card is pretty easy. That is to say, you just have to click on the network information icon to see all the details. On the other hand, do you ever wonder how to check it in Linux command line? It is really simple task if you […]

The post 8 steps to check your network interface information appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Learn how to send emails using Linux in 5 minutes

If I ask you how to send an email, what would you say? You will say go to gmail or yahoo mail and send the email. But, do you know that you can send emails using your Linux command line? Yes! you heard me right. We can do this by using the mail command. In […]

The post Learn how to send emails using Linux in 5 minutes appeared first on The Linux Juggernaut.

Share Button
Read More
| by Arround The Web

Configuring a caching only DNS server on Centos 7

Introduction DNS (Domain Name Server) is considered a critical component of any enterprise IT infrastructure. DNS runs as a service on a system and a DNS server can have different roles or we could say that DNS servers can be classified into multiple categories. In this quick article we will explain how to setup a […]

The post Configuring a caching only DNS server on Centos 7 appeared first on The Linux Juggernaut.

Share Button
Read More
| by Arround The Web

28 yum command examples for package management in Linux part 2

In our previous article on the Linux yum command, we covered how we could use the yum package manager to search for packages, install them, query information about packages, check for security updates and update the system to have the latest versions of packages installed. In this article, we’ll show how to use yum to […]

The post 28 yum command examples for package management in Linux part 2 appeared first on The Linux Juggernaut.

Share Button
Read More
| by Arround The Web

28 yum command examples for package management in Linux part 1

Introduction For managing software via the command line on our Redhat and Centos systems, we could use rpm directly or use yum which is somewhat of a feature rich front end for rpm. We covered the Linux rpm command and it’s features extensively in an earlier article. Yum is an acronym for yollowdog updater modified. […]

The post 28 yum command examples for package management in Linux part 1 appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

10 Examples of using nslookup in linux

The main use of nslookup is to help with any DNS issues you may have. You can use it to find the IP address of a host, find the domain name of an IP address, or find mail servers on a domain. This tool can be used in an interactive and a noninteractive mode. The Interactive mode […]

The post 10 Examples of using nslookup in linux appeared first on The Linux Juggernaut.

Share Button
Read More
  • 1
  • 2