Objective

Install SimpleScreenRecorder and use it to record video of your desktop.

Distributions

SimpleScreenRecorder is available on just about every distribution.

Requirements

A working Linux install with root privileges.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

Recording your Linux desktop is… well, simple. With SimpleScreenRecorder, you can easily record your whole desktop or a portion of the screen with very little overhead. To make things even better, SimpleScreenRecorder is a generic X program, so it's not tied to one specific desktop environment or another.

Objective

Learn to organize your passwords using the "pass" password manager on linux

Requirements

  • Root permissions needed to install required packages

Difficulty

EASY

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

If you have the good habit to never use the same password for more than one purpose, you have probably already felt the need for a password manager. There are many alternatives to choose from on linux, both proprietary (if you dare) and open source. If you, like me, think that simplicity it's the way to go, you may be interested in knowing however to use the pass utility.

Objective

Getting to know how special permissions works, how to identify and set them.

Requirements

  • Knowledge of the standard unix/linux permissions system

Difficulty

EASY

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

Normally, on a unix-like operating system, the ownership of files and directories is based on the default uid (user-id) and gid (group-id) of the user who created them. The same thing happens when a process is launched: it runs with the effective user-id and group-id of the user who started it, and with the corresponding privileges. This behavior can be modified by using special permissions.

Objective

Install and configure KDE Connect on Linux and Android.

Distributions

This will work on nearly all Linux distributions.

Requirements

A working Linux install with Plasma and root privileges. Also, an Android device.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

KDE Connect is easily the best tool for sharing between Android and Linux. It allows you to see your phone's notifications and text messages from the Linux desktop. It also lets you reply to those texts through your phone without picking it up or unlocking it.

Objective

Install and use Plasma Vault to create encrypted storage directories.

Distributions

This will work on any distribution with Plasma 5.11 or higher.

Requirements

A working Linux install with Plasma 5.11 or better and root privileges.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

The Plasma desktop's new Vault feature makes encrypting directories incredibly simple. It's built right in to the desktop task manager, and directories can be managed by regular users without sudo. Vault is an excellent middle ground between single file encryption and whole filesystem encryption. It's not hard to see how useful that can be.

Objective

Sideload an Android app from Ubuntu to a mobile device.

Distributions

This guide is tailored to Ubuntu, but the same principles will work on any distribution.

Requirements

A working Ubuntu install with root privileges and an Android device.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

Installing an app on Android isn't always as simple as downloading it from the Play Store. In a lot of cases, especially development, the Play Store isn't an option, and you need another way to push apps to an Android device.

Objective

Connect to a VPN automatically on booth with a service.

Distributions

This will work on almost any Linux distribution.

Requirements

A working Linux install with root privileges and a VPN subscription.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

VPNs are great. They protect people from all sorts of threats and snooping online. Sometimes, they can be a real pain to set up, or the set up procedure doesn't exactly fit the way you use your computer. That's why it's a great solution to run a VPN connection as a service at startup. You don't need to remember to turn it on, and it will keep running even if you don't have a desktop environment up. Plus, it will usually run before your desktop and any of your other connections, helping to keep your data from leaking.

Objective

Encrypt individual files with GPG.

Distributions

This will work with any Linux distribution.

Requirements

A working Linux install with GPG installed or root privileges to install it.

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

Encryption is important. It's absolutely vital to protecting sensitive information. Your personal files are worth encrypting, and GPG provides the perfect solution.

Objective

Display the current weather forecast in the Linux command line.

Distributions

This will work on any Linux distribution.

Requirements

A working Linux install with an Internet connection.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

It's be convenient to be able to retrieve the latest weather forecast right from your terminal without opening up a web browser, wouldn't it? What about scripting it or setting a cron job? Well, you can.

http://wttr.in is a website that allows you to search for weather forecasts anywhere in the world, and it displays he results in ASCII characters. By using cURL, you can access http://wttr.in, you can get your results directly in the terminal.

Objective

Easily manage programs installed from source and dotfiles using GNU stow

Requirements

  • Root permissions

Difficulty

EASY

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

Sometimes we have to install programs from source: maybe they are not available through standard channels, or maybe we want a specific version of a software. GNU stow is a very nice symlinks factory program which helps us a lot by keeping files organized in a very clean and easy to maintain way.

Objective

Configure Linux to use jumbo frames.

Distributions

This will work with any Linux distribution.

Requirements

A working Linux install with network connectivity and root privileges.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

Are file transfers slow on your network? Are you constantly passing data between your computers? Well, maybe jumbo frames are for you.

Jumbo frames are larger than standard network packet payloads. Normally the payload size or MTU(Maximum Transfer Unit) is set to 1500 bytes. Jumbo frames can support to 9000 bytes per packet.

Jumbo frames decrease the overhead associated with transferring files by limiting the number of packets that your networking equipment needs to process.

Objective

Configure WiFi using only command line utilities.

Distributions

This will work on any major Linux distribution.

Requirements

A working Linux install with root privileges and a compatible wireless network adapter.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

Lots of people like graphical utilities for managing their computers, but plenty don't too. If you prefer command line utilities, managing WiFi can be a real pain. Well, it doesn't have to be.

Objective

Use iptables to block all Internet connections in the event your VPN is disconnected.

Distributions

This will work on any Linux distribution.

Requirements

A working Linux install with root privileges.

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

If you're connected to a VPN, you need a killswitch. No, it's not as metal as it sounds. It's just a mechanism that stops your Internet connection when you're disconnected from the VPN. It protects you from inadvertently leaking sensitive information onto the Internet when the VPN connection drops.

Some VPN services provide clients with a built-in killswitch, but none are as reliable as using iptables. Since iptables is independent of your VPN service, and it's integrated into the kernel itself, it won't fail when your VPN does. Iptables is also a well-proven security technology that can and will keep your computer safe.

Objective

Learn how to configure and use PDO for database access: from error modes to fetch methods.

Requirements

  • A standard knowledge of MySQL and mysql command line client;
  • Being familiar with the fundamental concepts of Object Oriented Programming
  • PHP >= 5.1
  • Have a working MySQL/MariaDB database

Difficulty

MEDIUM

Conventions

Objective

Set a custom message of the day.

Distributions

This will work on any Linux distribution.

Requirements

A working Linux install with root privileges.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

When you first log in to a terminal on a Unix system, Linux included, you are usually greeted by that system's message of the day(MOTD). The message of the day, gives you important information about the system or just messages from the system admin. Of course, if you are are the system admin, it's up to you to set that message. If it's your own system, you can get creative with your message and include any information that you choose.

FIND LATEST LINUX JOBS on LinuxCareers.com
Submit your RESUME, create a JOB ALERT or subscribe to RSS feed.
LINUX CAREER NEWSLETTER
Subscribe to NEWSLETTER and receive latest news, jobs, career advice and tutorials.
DO YOU NEED ADDITIONAL HELP?
Get extra help by visiting our LINUX FORUM or simply use comments below.

You may also be interested in: