Objective

The ifconfig command has been deprecated and thus missing by default on CentOS Linux.
# ifconfig
bash: /usr/sbin/ifconfig: No such file or directory
The new and recommended alternative for examining a network configuration on CentOS Linux is ip command. For example to use ip command to display a network configuration run the following:
# ip address
The above ip command can be abbreviated to:
# ip a
If you still prefer to use ifconfig command you can easily install it as part of the net-tools package.

Requirements

Privileged access to your CentOS Linux system is required.

Difficulty

EASY

Conventions

Objective

Set up Ubuntu 16.04 for Ethereum mining.

Distributions

This guide was tested for Ubuntu 16.04, but many principles will hold true on other distributions.

Requirements

A working Ubuntu 16.04 installation with root privileges. You also need a modern GPU with more than 4GB of RAM.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

It's hard not to have heard about Ethereum by now. It's the hottest new cryptocurrency that's still very much so on the rise. Unlike Bitcoin, Ethereum is still practical to mine, and tons of people are getting in on it. If you've been considering mining Ethereum, this guide will help you get started using open source tools and Ubuntu.

Objective

Install the Ring Free Software VIOP client.

Distributions

This guide covers Debian, Ubuntu, and Fedora, but Ring can be installed from source on other distributions.

Requirements

A working Linux install with root privileges.

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

If you ask just about any Linux user, they'll agree that Skype is pretty terrible. There's not a whole lot to like there, especially since the Linux client is just a poorly maintained wrapper for the web app. There have been several attempts to create a free and open source alternative to Skype, but none have been as polished or complete as Ring.

Objective

Install the Riot desktop Matrix client on Debian/Ubuntu.

Distributions

Recent versions of Debian or Ubuntu

Requirements

A working install of Debian or Ubuntu

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

Matrix is an up-and-coming chat protocol that provides a real alternative to proprietary solutions like Slack. Unlike Slack, Matrix is free, open source, and completely decentralized. With Matrix, you own your chat.

Because Matrix is just a protocol, there are a variety of client implementations. The most widely used and well-polished is Riot.

Objective

Demonstrate the need to disable WPS by obtaining your WPA2 passphrase with Reaver.

Distributions

This will work on all distributions, but Kali is recommended.

Requirements

A working Linux install with root privileges on a computer with a wireless adapter.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

WPS is trash. Don't use it. Don't ever use it. There is absolutely no excuse to use it. This guide will walk you through the steps of breaking WPS to obtain a wireless network's WPA password.

This guide is purely for educational purposes. Using this process on a network that you do not own is illegal.

Objective

Spoof a MAC address to gain access to MAC whitelisted network.

Distributions

It's recommended that you use Kali Linux, but you can install the required programs on any distribution.

Requirements

A working Linux install with root privileges and a wireless adapter. You should also have a router that you can set up with a MAC whitelist to test.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

MAC address whitelisting sounds like a great way to prevent unauthorized access to your wireless network, but it doesn't work. The purpose of this guide is to demonstrate exactly how easy it is to spoof a whitelisted MAC address and gain access to a restricted network.

This guide is purely for educational purposes. DO NOT attempt this on a network that you do not own.

Objective

Assess the security of your WiFi network by detecting its hidden SSID.

Distributions

It's recommended that you use Kali Linux, but this can be done with any Linux distribution.

Requirements

A working Linux installation with root privileges and an installed wireless adapter.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

WiFi security isn't easy. There's a ton of potential threats, and even more reported "solutions" flying around out there. One supposed security measure that you can take is hiding your network's SSID. The guide will demonstrate why that does absolutely nothing to stop attackers.

Objective

Overclock your AMD Ryzen CPU using Linux and your motherboard's BIOS.

Distributions

This will work with all Linux distributions running kernel 4.10 or better.

Requirements

A working Linux install running kernel 4.10 or better with root privileges running on an AMD Ryzen base machine.

Difficulty

Medium

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

AMD's Ryzen CPUs were designed to be overclocked. They're excellent at it, and they benefit greatly from it. Most Ryzen CPUs can even overclock a few hundred MHz using a stock cooler. That's impressive no matter how you look at it.

Windows users got a convenient graphical tool to overclock Ryzen when it launched. Linux users can still overclock Ryzen, but they need to do it the old way, through the BIOS.

There are temperature monitoring and stress testing tools available on Linux too, so you can test out your overclocks once you've set them.

Objective

Overclock Radeon RX 400 series and newer graphics cards under Linux using the AMDGPU open source drivers.

Distributions

This method will work on any Linux distribution running the AMDGPU drivers.

Requirements

A working Linux install running kernel 4.10 or newer with root privileges and the AMDGPU drivers installed.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

The open source AMDGPU drivers don't have a fancy GUI interface that lets you overclock your card. Actually, they don't come with any kind of control center at all. That's alright, though, you can still overclock your card by modifying a couple of values in configuration files, a perfectly Linux solution if you think about it.

Objective

Learn how to restrict users access on a Linux machine

Operating System and Software Versions

  • Operating System: - All Linux distributions

Requirements

  • Root permissions

Difficulty

EASY

Conventions

Introduction

UFW also known as Uncomplicated Firewall is an interface to iptables and is particularly well-suited for host-based firewalls. UFW provide an easy to use interface for beginner user who is unfamiliar with firewall concepts. It is most popular firewall tool originating from Ubuntu. It supports both IPv4 and IPv6.

In this tutorial, we will learn how to install and use UFW firewall on Linux.

Requirements

  • Any Linux based distribution installed on your system
  • root privileges setup on your system

Installing UFW

Ubuntu

By default, UFW is available in most Ubuntu based distributions. If it is deleted, you can install it by running the following linux command.
# apt-get install ufw -y 

Debian

Objective

Install Termux on an Android device and use it to establish passwordless SSH to a Linux computer.

Distributions

This guide will work with any Linux computer.

Requirements

A working Linux computer and an Android device.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

It might seem kind of strange, but being able to access the command line of your computer remotely from your phone is very convenient, especially when paired with an excellent Android terminal emulator, like Termux. Termux makes the process very easy. It emulates parts of a GNU/Linux, including a /home directory. Termux actually has a package manager, in the form of Apt, and it can install some basic packages.

Objective

Install and configure Dunst for desktop notifications.

Distributions

Dunst is only distributed as source, so it can be built on any current distribution.

Requirements

A working Linux install with root privileges.

Difficulty

Medium

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

No one wants to spend hours configuring and customizing their tiling window manager only for an ugly, poorly rendered notification window from GNOME to keep popping up and ruining the overall feel of their desktop.

If you're looking for a more minimal and configurable notification daemon, look no further than Dunst. It provides a basic notification daemon that you can style and configure to match any tiling window manager setup. Plus, it's super light weight, so there's no need to worry about it hogging resources.

In a relatively short time, Discord has become the favorite chat solution among gamers. That’s a fairly good thing. It’s easy to use and well supported across all platforms. Well, not quite. If you go to the Discord website at the time of writing this, there is one glaring omission from Discord’s list of available clients, Linux.

However, the Discord developers do plan on supporting Linux and have even released an experimental ‘canary’ version that you can install and use now. It’s definitely not perfect, but it does work fairly well, and, if you’re a gamer, why miss out?


Objective

Create a backup script that regularly backs up important files from your /home directory.

Distributions

This will work with any Linux distribution.

Requirements

A working Linux install with root access.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

Sure, there are backup utilities for Linux, but with a couple of scripts, you can keep your important files backed up regularly with little to no effort.

A very simple Bash script will do the bulk of the work. For the rest, you'll take advantage of the cron system already on your computer.

FIND LATEST LINUX JOBS on LinuxCareers.com
Submit your RESUME, create a JOB ALERT or subscribe to RSS feed.
LINUX CAREER NEWSLETTER
Subscribe to NEWSLETTER and receive latest news, jobs, career advice and tutorials.
DO YOU NEED ADDITIONAL HELP?
Get extra help by visiting our LINUX FORUM or simply use comments below.

You may also be interested in: