Onionshare Running

Share Files Securely With Onionshare

Objective

Install Onionshare in Linux and use it to send files over Tor.

Distributions

This guide targets Ubuntu, Debian, Fedora, and Arch Linux.

Requirements

A working install of one of the supported distributions with root privileges.

Conventions

  • # – requires given linux command to be executed with root privileges either directly as a root user or by use of sudo command
  • $ – given linux command to be executed as a regular non-privileged user

Introduction

Sharing files can be a pain. The larger the file is, the more difficulty it inevitably creates. If you want those files kept private, you’re in for a real nightmare. Well, not exactly.

Onionshare is a relatively new application that allows you to share files of any size securely and relatively anonymously over the Tor network without the need for a “midde-man” website. It’s completely free and open source, and it’s actually easy for anyone to use.

Read more

amule-web-interface-panel

How to setup AMule and control it via web interface on a Raspberry Pi

AMule is a p2p, open source client for the  eD2k network. Released under the GPL license, it supports a lot of platforms and operating systems. In this tutorial we will see how to install a minimal, headless version of AMule on Raspbian “Stretch”, the latest version of the official Raspberry Pi OS. We will see how to setup the amule-daemon and adjust the firewall rules in order to control it via web interface.

In this tutorial you will learn:

  • How to install and configure the amule-daemon
  • How to configure and access the amule web interface

Read more

Transmission Web Interface

How to set up transmission-daemon on a Raspberry Pi and control it via web interface

Introduction

Transmission is probably the most famous torrent client in the Gnu/Linux world, and it’s very often used even on other operating systems. It’s really easy to use, and its graphical interface is very intuitive; however in this tutorial we will see how to install transmission-daemon and run transmission on a headless machine: that’s an ideal setup to create a “Torrent-box”, using for example a Raspberry Pi, to reduce power usage.

Once installed and configured, we will be able to manage the application using the web interface. For the sake of this tutorial I will install transmission-daemon on a Raspberry Pi, using the Raspbian operating system, however the same instructions should work on Ubuntu and Debian.

Read more

Signal App

Install and Use The Signal Encrypted Messenger App

Objective

Install Signal on Android and Linux.

Distributions

This guide is geared towards Ubuntu and Debian, but will work on other distributions with modification.

Requirements

A working Linux install with root privileges and an Android phone

Conventions

  • # – requires given linux command to be executed with root privileges either directly as a root user or by use of sudo command
  • $ – given linux command to be executed as a regular non-privileged user

Introduction

Do you wish there was a more secure option for sending text messages and even making calls from your phone? Wouldn’t it be great if that option utilized end-to-end encryption to ensure that your communications were entirely protected? Well, that option exists in the form of Signal.

Signal is an open source app that supports text and calls. It’s available for Android and iOS, and it has desktop clients available across platforms. If you’re wondering exactly how trustworthy Signal is, it was endorsed by Edward Snowden and the EFF. It’s pretty safe to say that it’s a good option.

Read more

Introduction to grep and regular expressions

Objective

After reading this tutorial you should be able to understand how the grep command works, and how to use it with basic and extended regular expressions.

Difficulty

EASY

Introduction

Grep is one of the most useful tools we can use when administering a unix-based machine: its job is to search for a given pattern inside one or more files and return existing matches.

In this tutorial we will see how to use it, and we will examine also its variants: egrep and fgrep. We will put this really famous excerpt from the book “The Lord Of The Rings” on a file, and we will use as a target for our examples:

Three Rings for the Elven-kings under the sky,
Seven for the Dwarf-lords in their halls of stone,
Nine for Mortal Men doomed to die,
One for the Dark Lord on his dark throne
In the Land of Mordor where the Shadows lie.
One Ring to rule them all, One Ring to find them,
One Ring to bring them all, and in the darkness bind them,
In the Land of Mordor where the Shadows lie.

The file will be called lotr.txt.

Read more

Rsync Examples

Examples on how to use Rsync for local and remote data backups and synchonizations

Rsync is a very useful tool which allows Linux system administrators synchronize data locally or with a remote filesystem via the ssh protocol or by using the rsync daemon. Using rsync is more convenient than simply copying data, because it is able to spot and synchronize only the differences between a source and a destination. The program has options to preserve standard and extended filesystem permissions, compress the data during transfers and more. We will see the most used ones in this guide.

In this tutorial you will learn:

  • How to use rsync to syncronize data
  • How to use rsync with a remote filesystem via ssh
  • How to use rsync with a remote filesystem via the rsync daemon
  • How to exclude files from the synchronization

Read more

Complete iptables killswitch

How To Create A VPN Killswitch Using Iptables on Linux

Objective

Use iptables to block all Internet connections in the event your VPN is disconnected.

Distributions

This will work on any Linux distribution.

Requirements

A working Linux install with root privileges.

Conventions

  • # – requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ – requires given linux commands to be executed as a regular non-privileged user

Introduction

If you’re connected to a VPN, you need a killswitch. No, it’s not as metal as it sounds. It’s just a mechanism that stops your Internet connection when you’re disconnected from the VPN. It protects you from inadvertently leaking sensitive information onto the Internet when the VPN connection drops.

Some VPN services provide clients with a built-in killswitch, but none are as reliable as using iptables. Since iptables is independent of your VPN service, and it’s integrated into the kernel itself, it won’t fail when your VPN does. Iptables is also a well-proven security technology that can and will keep your computer safe.

Read more

Ubuntu Bionic Installer

Fedora vs Ubuntu

Introduction

Ubuntu and Fedora are both among the top desktop Linux distributions, but they are very different. Fedora is Redhat’s testing ground, and it’s geared more towards developers and system administrators. On the other hand, Ubuntu is Canonical’s primary product, and it tries to please everyone.

Read more

Create Your Key in QtPass

Encrypt and Manage Your Passwords With QtPass and PassFF Password Manager on Linux

Objective

Install and configure QtPass and PassFF password managers.

Distributions

This guide supports Debian, Ubuntu, Fedora, OpenSUSE, and Arch Linux.

Requirements

A working install of one of the supported distributions with root permissions.

Conventions

  • # – requires given linux command to be executed with root privileges either directly as a root user or by use of sudo command
  • $ – given linux command to be executed as a regular non-privileged user

Introduction

Remembering Passwords is awful. It’s not something anyone likes, and with people needing more online accounts than ever, it’s becoming entirely unmanageable. Remember, using the same password twice is a BAD IDEA.

Pass is an old school command line tool that’s known for top-notch password management. You can always still use that, but QtPass gives you a more convenient GUI on top of Pass, and PassFF lets you use the password database you create directly with Firefox. Installing these tools on just about any distribution is very simple, and the end result will make your online life a lot easier.

Read more

How to setup the rsync daemon on Linux

How to setup the rsync daemon on Linux

In a previous article we saw some basic examples of how to use rsync on Linux to transfer data efficiently. As we saw, to synchronize data with a remote machine we can use both a remote shell as  ssh or the rsync daemon. In this article we will focus on the latter option, and we will see how to install and configure rsyncd on some of the most used Linux distributions.

In this tutorial you will learn:

  • How to install and configure the rsync daemon

Read more

How to manage partitions with GNU Parted on Linux

Objective

Learning how to manage partitions using the GNU parted partition manager on Linux.

Requirements

  • Root permissions

Conventions

  • # – requires given linux command to be executed with root privileges either
    directly as a root user or by use of sudo command
  • $ – given linux command to be executed as a regular non-privileged user

Introduction

Partitions management is one of the most essentials and dangerous task to perform when working with operating systems. In this tutorial we will focus on the use of GNU parted and see how we can use it to create, resize and delete partitions from the command line interface. Parted can work both in interactive and non-interactive mode, the latter being particularly useful when we want to automate some operations or when commands must run in an unattended context, perhaps in a script or inside a kickstart file.

Read more

main-image

How fstab works – introduction to the /etc/fstab file on Linux

The /etc/fstab file is one of the most important files in a Linux-based system, since it stores static information about filesystems, their mountpoints and mount options. In this tutorial we will learn to know its structure in details, and the syntax we can use to specify each entry in the file.

In this tutorial you will learn:

  • How to use the fstab file to provide static filesystem information
  • How the fstab file is structured
  • What is the purpose of each entry field in the file

Read more