Objective

Download YouTube videos from the command line using youtube-dl.

Distributions

Youtube-dl is a Python script that's usable on any distribution.

Requirements

  • A Linux install with root access.
  • Python
  • Pip Python package manager

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Introduction

People have wanted to download videos from YouTube since the very beginning. Several methods have worked over the years, but youtube-dl provides the most direct and reliable approach.

Youtube-dl is a Python script that pulls videos straight from YouTube and can format them on your computer. It can also separate audio or subtitles from videos.

Objective

Learn how to install, use, and customize Neofetch to display system information in the terminal.

Distributions

Neofetch is available for nearly Linux distributions.

Requirements

A Linux installation with access to root for package installations.

Difficulty

Easy

Conventions

  • # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - requires given linux commands to be executed as a regular non-privileged user

Objective

Learn how to use cURL to make HTTP requests to interact with online content.

Distributions

All GNU/Linux distributions

Requirements

Just cURL. It's available in every distribution's repository.

Difficulty

Easy

Conventions

# - requires root access either via su or sudo.

$ - run as your regular user

Introduction

cURL is a command line multi-tool for interacting with the web. cURL is capable of acting like a web browser, downloading files, accessing APIs, and even signing you into online accounts. cURL can be scripted, and it handles everything from a simple command line interface.

Linux Permissions, How Do They Work?

The Linux permission system for files can appear somewhat confusing to new Linux users. There's a system of letters or numbers all jumbled together in a seemingly unordered mess.

In reality, it's quite simple, once you understand how it's broken down.

Directories, Links, Read, Write, and Execute

Start off by going to a folder in your home directory. The Downloads folder is usually a good option. Once you're there, run ls -lah.
$ cd ~/Downloads
$ ls -lah

Objective

There are multiple system managers which can by possibly running on your Linux system. The current most common system managers are SysV (init), Systemd and Upstart. You may find this short guide to be of use to you, if you are unsure which, system manager is running on your Linux system.

Requirements

Privileged access to your Linux system is required.

Difficulty

EASY

Conventions

Objective

In some cases, it is necessary to disable Docker's IPtables rules to avoid overwriting any existing firewall rules. The following article describes a simple to follow procedure on how to disable disable Docker's IPtables rules on Systemd Linux systems.

Requirements

Privileged access to your Systemd Linux is required.

Difficulty

EASY

Conventions

Introduction

Hashcat is a robust password cracking tool that can help you recover lost passwords, audit password security, benchmark, or just figure out what data is stored in a hash.

There are a number of great password cracking utilities out there, but Hashcat is known for being efficient, powerful, and full featured. Hashcat makes use of GPUs to accelerate hash cracking. GPUs are much better and handling cryptographic work than CPUs are, and they can be utilized in much greater numbers than CPUs. Hashcat also supports a very wide range of popular hashes, to ensure that it can handle deciphering nearly any password.

Please note that misuse of this program can be illegal. Only test on systems that you own or have written permission to test on. Don't share or post hashes or results publicly. Hashcat should be used for password recovery and professional security audits.

Introduction

Encrypting everything online is becoming more important by the day. Email is no different. For Linux users, the process is actually very simple with three common open source tools; Mozilla Thunderbird, Enigmail, and GNU PGP(GPG.) Through the use of these three tools, you can send and receive encrypted messages easily, and protect yourself and the people you're communicating with from attackers and privacy invasions.

Gathering The Pieces

Install GPG

The first thing that you will need in order to begin encrypting your emails is GPG. Since GPG is part of the GNU Project and is a common tool for generating encryption keys, it's likely to be in any distro's repositories. Use your package manager to install it.

Introduction

Transferring files between computers can be a pain. FTP is somewhat clunky and old, and using online services isn't direct and is less than ideal for handling sensitive files. Git works well for code and text, but isn't the best for binary files and requires a repository to be configured. So, what's a good solution for sending files directly between computers? SFTP.

SFTP is a secure file transfer protocol that makes use of SSH to send files between computers. It is encrypted and direct. It allows you to use an existing service to send files, thereby reducing your attack surface, and it eliminates the need to rely on potentially vulnerable passwords for file transfers.

Before you go any further, you need to set up SSH keys for the machines you want to work with. If you don't know how, check out our guide on setting up SSH key based authentication.

Introduction

SSH is in essential tool for any Linux user, but many people aren't making the most of its robust capabilities, namely secure logins with keys.

SSH key pairs allow you to login much more securely by limiting logins to only those computers that possess an encrypted key that has been paired with the login target. Unlike passwords, these keys can't be guessed, so there's no need to worry about someone trying thousands of passwords to break into your computer or server. No key equals no access.

The good news is; these keys are very easy to set up and use, so you don't have to worry about maintaining configurations or wading through a long setup process.

Objective

The following guide describes simple to follow steps on how to install the open-source automation engine Ansible on CentOS Linux.

Operating System and Software Versions

  • Operating System: - CentOS 7 Linux
  • Software: - Ansible 2.2 ( EPEL ) & Ansible 2.4 ( Source )

Requirements

Privileged access to your CentOS Linux system will be required to perform the Ansible installation.

Difficulty

MEDIUM

Conventions

Introduction

For anyone looking to protect their privacy online, Tor is an invaluable tool. It is both one of the most reliable ways to hide your identity and one of the easiest to use.

There are multiple different ways to use Tor, but the simplest and quickest is the Tor Browser bundle. It is a self-contained Tor installation coupled with a specially configured Firefox installation designed to get you up an running with as few hassles and as little configuration as possible.

Despite its out-of-the-box nature, there are also some configuration changes and additions that you can make to further improve the capabilities of the Browser Bundle.

Objective

The following guide describes simple to follow steps on how to install the latest version of the open-source automation engine Ansible.

Operating System and Software Versions

  • Operating System: - Debian Stretch 9

Requirements

Privileged access to you Debian Linux system will be required.

Difficulty

EASY

Conventions

Introduction

What if you would be able to perform a data compression four times faster, with the same compression ratio as you normally do. Pbzip2 command line utility can easily accomplish this as it gives you an option to select number CPU and amount of RAM to be used during the compression process.

Regular tar and bzip2 compression

We all know the regular command to perform tar and bzip2 directory compression. The below command will tar and compress our sandbox directory FOOBAR. We are also prefixing the below command to get exact time for how long will it take to output compressed file FOOBAR.tar.Bbz2 from 242MB FOOBAR directory:
# time tar cjf FOOBAR1.tar.bz2 FOOBAR/

real    0m20.030s
user    0m19.828s
sys     0m0.304s
From the above time output we can see that it took about 20 seconds to create following compressed file:
# ls -lh FOOBAR1.tar.bz2 
-rw-r--r-- 1 root root 54M Mar 10 20:25 FOOBAR1.tar.bz2

Introduction

There's no denying that Vim is awesome on its own. It provides users with unprecedented configuration potential and quick, powerful commands. That said, Vim can get even better with the use of plugins.

There are hundreds of plugins that can seriously amp-up your Vim installation. Many of them are tailored for specific uses, like programming in a certain language or even writing. Others are more general and enhance Vim's existing capabilities. Whichever it is that you need, you're going to have to manage those packages.

There are a number of Vim package managers, but Pathogen is the most universal and simple to use and install. Pathogen works by pulling all of the Vim plugins in a certain directory into your Vim installation and activating them with a single line in your .vimrc file.

FIND LATEST LINUX JOBS on LinuxCareers.com
Submit your RESUME, create a JOB ALERT or subscribe to RSS feed.
LINUX CAREER NEWSLETTER
Subscribe to NEWSLETTER and receive latest news, jobs, career advice and tutorials.
DO YOU NEED ADDITIONAL HELP?
Get extra help by visiting our LINUX FORUM or simply use comments below.

You may also be interested in: