Objective

Connect to a VPN automatically on booth with a service.

Distributions

This will work on almost any Linux distribution.

Requirements

A working Linux install with root privileges and a VPN subscription.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

VPNs are great. They protect people from all sorts of threats and snooping online. Sometimes, they can be a real pain to set up, or the set up procedure doesn't exactly fit the way you use your computer. That's why it's a great solution to run a VPN connection as a service at startup. You don't need to remember to turn it on, and it will keep running even if you don't have a desktop environment up. Plus, it will usually run before your desktop and any of your other connections, helping to keep your data from leaking.

Objective

Encrypt individual files with GPG.

Distributions

This will work with any Linux distribution.

Requirements

A working Linux install with GPG installed or root privileges to install it.

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

Encryption is important. It's absolutely vital to protecting sensitive information. Your personal files are worth encrypting, and GPG provides the perfect solution.

Objective

Display the current weather forecast in the Linux command line.

Distributions

This will work on any Linux distribution.

Requirements

A working Linux install with an Internet connection.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

It's be convenient to be able to retrieve the latest weather forecast right from your terminal without opening up a web browser, wouldn't it? What about scripting it or setting a cron job? Well, you can.

http://wttr.in is a website that allows you to search for weather forecasts anywhere in the world, and it displays he results in ASCII characters. By using cURL, you can access http://wttr.in, you can get your results directly in the terminal.

Objective

Easily manage programs installed from source and dotfiles using GNU stow

Requirements

  • Root permissions

Difficulty

EASY

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

Sometimes we have to install programs from source: maybe they are not available through standard channels, or maybe we want a specific version of a software. GNU stow is a very nice symlinks factory program which helps us a lot by keeping files organized in a very clean and easy to maintain way.

Objective

Configure Linux to use jumbo frames.

Distributions

This will work with any Linux distribution.

Requirements

A working Linux install with network connectivity and root privileges.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

Are file transfers slow on your network? Are you constantly passing data between your computers? Well, maybe jumbo frames are for you.

Jumbo frames are larger than standard network packet payloads. Normally the payload size or MTU(Maximum Transfer Unit) is set to 1500 bytes. Jumbo frames can support to 9000 bytes per packet.

Jumbo frames decrease the overhead associated with transferring files by limiting the number of packets that your networking equipment needs to process.

Objective

Configure WiFi using only command line utilities.

Distributions

This will work on any major Linux distribution.

Requirements

A working Linux install with root privileges and a compatible wireless network adapter.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

Lots of people like graphical utilities for managing their computers, but plenty don't too. If you prefer command line utilities, managing WiFi can be a real pain. Well, it doesn't have to be.

Objective

Use iptables to block all Internet connections in the event your VPN is disconnected.

Distributions

This will work on any Linux distribution.

Requirements

A working Linux install with root privileges.

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

If you're connected to a VPN, you need a killswitch. No, it's not as metal as it sounds. It's just a mechanism that stops your Internet connection when you're disconnected from the VPN. It protects you from inadvertently leaking sensitive information onto the Internet when the VPN connection drops.

Some VPN services provide clients with a built-in killswitch, but none are as reliable as using iptables. Since iptables is independent of your VPN service, and it's integrated into the kernel itself, it won't fail when your VPN does. Iptables is also a well-proven security technology that can and will keep your computer safe.

Objective

Learn how to configure and use PDO for database access: from error modes to fetch methods.

Requirements

  • A standard knowledge of MySQL and mysql command line client;
  • Being familiar with the fundamental concepts of Object Oriented Programming
  • PHP >= 5.1
  • Have a working MySQL/MariaDB database

Difficulty

MEDIUM

Conventions

Objective

Set a custom message of the day.

Distributions

This will work on any Linux distribution.

Requirements

A working Linux install with root privileges.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

When you first log in to a terminal on a Unix system, Linux included, you are usually greeted by that system's message of the day(MOTD). The message of the day, gives you important information about the system or just messages from the system admin. Of course, if you are are the system admin, it's up to you to set that message. If it's your own system, you can get creative with your message and include any information that you choose.

Objective

The ifconfig command has been deprecated and thus missing by default on CentOS Linux.
# ifconfig
bash: /usr/sbin/ifconfig: No such file or directory
The new and recommended alternative for examining a network configuration on CentOS Linux is ip command. For example to use ip command to display a network configuration run the following:
# ip address
The above ip command can be abbreviated to:
# ip a
If you still prefer to use ifconfig command you can easily install it as part of the net-tools package.

Requirements

Privileged access to your CentOS Linux system is required.

Difficulty

EASY

Conventions

Objective

Set up Ubuntu 16.04 for Ethereum mining.

Distributions

This guide was tested for Ubuntu 16.04, but many principles will hold true on other distributions.

Requirements

A working Ubuntu 16.04 installation with root privileges. You also need a modern GPU with more than 4GB of RAM.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

It's hard not to have heard about Ethereum by now. It's the hottest new cryptocurrency that's still very much so on the rise. Unlike Bitcoin, Ethereum is still practical to mine, and tons of people are getting in on it. If you've been considering mining Ethereum, this guide will help you get started using open source tools and Ubuntu.

Objective

Install the Ring Free Software VIOP client.

Distributions

This guide covers Debian, Ubuntu, and Fedora, but Ring can be installed from source on other distributions.

Requirements

A working Linux install with root privileges.

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

If you ask just about any Linux user, they'll agree that Skype is pretty terrible. There's not a whole lot to like there, especially since the Linux client is just a poorly maintained wrapper for the web app. There have been several attempts to create a free and open source alternative to Skype, but none have been as polished or complete as Ring.

Objective

Install the Riot desktop Matrix client on Debian/Ubuntu.

Distributions

Recent versions of Debian or Ubuntu

Requirements

A working install of Debian or Ubuntu

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

Matrix is an up-and-coming chat protocol that provides a real alternative to proprietary solutions like Slack. Unlike Slack, Matrix is free, open source, and completely decentralized. With Matrix, you own your chat.

Because Matrix is just a protocol, there are a variety of client implementations. The most widely used and well-polished is Riot.

Objective

Demonstrate the need to disable WPS by obtaining your WPA2 passphrase with Reaver.

Distributions

This will work on all distributions, but Kali is recommended.

Requirements

A working Linux install with root privileges on a computer with a wireless adapter.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

WPS is trash. Don't use it. Don't ever use it. There is absolutely no excuse to use it. This guide will walk you through the steps of breaking WPS to obtain a wireless network's WPA password.

This guide is purely for educational purposes. Using this process on a network that you do not own is illegal.

Objective

Spoof a MAC address to gain access to MAC whitelisted network.

Distributions

It's recommended that you use Kali Linux, but you can install the required programs on any distribution.

Requirements

A working Linux install with root privileges and a wireless adapter. You should also have a router that you can set up with a MAC whitelist to test.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

MAC address whitelisting sounds like a great way to prevent unauthorized access to your wireless network, but it doesn't work. The purpose of this guide is to demonstrate exactly how easy it is to spoof a whitelisted MAC address and gain access to a restricted network.

This guide is purely for educational purposes. DO NOT attempt this on a network that you do not own.

FIND LATEST LINUX JOBS on LinuxCareers.com
Submit your RESUME, create a JOB ALERT or subscribe to RSS feed.
LINUX CAREER NEWSLETTER
Subscribe to NEWSLETTER and receive latest news, jobs, career advice and tutorials.
DO YOU NEED ADDITIONAL HELP?
Get extra help by visiting our LINUX FORUM or simply use comments below.

You may also be interested in: