How to reset Kali Linux root password

How to reset Kali Linux root password

It’s possible to reset Kali Linux password in the event that you are no longer able to login to the root user account. This happens if you haven’t logged in for a while and have since forgot Kali Linux password. In case you have not already tried, the default Kali password for root user is toor (root backwards) on VMWare and live images. Try logging in with this password before resetting the Kali Linux password.

Read more

Set Kali root password and enable root login

Set Kali root password and enable root login

In order to enable root login for Kali Linux, we must set the the root password manually. In past versions of Kali Linux, users were able to log in directly to the root account by default. On more recent versions, this has been disabled. The reasoning behind this change should be obvious, but if you’re a Kali user, you probably know your way around a Linux system by now, and there’s not much risk in letting you use the root account to log in.

Read more

How to enable/disable firewall on Raspberry Pi

How to enable/disable firewall on Raspberry Pi

The firewall on a Raspberry Pi will, by default, block incoming connections to certain ports. This is a security feature, but may cause problems if you try to configure an SSH server on your Raspberry Pi, host a website, or otherwise host some service that needs to accept incoming connections. The usual answer to this problem is to configure the firewall to accept the connections on the particular ports that you need to open. Another alternative is to disable the firewall completely.

Read more

Checking Your Raspberry Pi's OS Version

Checking Your Raspberry Pi’s OS Version

Being aware of your current Raspberry Pi OS version will help you know when it is time to update. It is important to know the version of your Raspberry Pi system, as new versions are released based on Debian’s release schedule, and new updates are issued all the time. Staying up to date will keep your Raspberry Pi secure and ensure that you have the newest software available. All Raspberry Pi models can run the same operating system, so updates are universal across all devices.

Read more

List of best hex editors on Linux

List of best hex editors on Linux

Hex editors allow users to edit a binary file after it has already been compiled. Ordinarily, you should make changes to a program by editing the source code and compiling it into an executable file. But if you do not have access to the source code, it is still possible to change various bytes of data of the compiled file, in the hopes that your edit will yield the desired results. This is a hacky solution that can be used for both honest and nefarious purposes.

Read more

How to ZIP file with password on Linux

How to ZIP file with password on Linux

If you have one or more files that you need to send to a friend or store for a long time, compressing the files into a .zip archive is a good way to save on space and combine all files into a single object. If you need to keep the file contents private, for fear that they could be intercepted by the wrong party, or that someone could try to access them on your own system, then it is possible to add a password to your zip file. In this tutorial, you will learn how to zip files and add a password to your zip archive on a Linux system.

Read more

How to kill process by port

How to kill process by port

Processes that utilize the network connection of your Linux system will occupy a port whenever they are uploading or downloading data, or listening for incoming connections. A common example present on many Linux servers would be the SSH protocol, which listens for and accepts incoming connections on port 22 by default. Ordinarily, administrators can kill a process using the PID number, or by specifying the process name. But in some cases, we may want to kill a process according to which port number it is using.

Read more

how to deploy a self-hosted vaultwarden instance

How to deploy a self-hosted Vaultwarden instance

Everyone, nowadays, has several accounts and credentials to take care of, that’s why everyone needs a decent and possibly open source password manager. When it comes to managing passwords there are many choices available on Linux: in the past, for example we talked about “pass”, a great, command line oriented, password-manager based on standard tools such as GPG and git. In this article we explore an alternative which can be the ideal solution for individuals and small organizations: Vaultwarden.

Read more

How to Restart Kubernetes on Linux

How to Restart Kubernetes on Linux

Kubernetes is container orchestration software that allows us to deploy, manage, and scale containerized applications. Even though Kubernetes has a reputation for being highly reliable, the need to restart it may arise, just like it sometimes does for any other application or service. Kubernetes is split into different components that can all be restarted individually, so that other parts can continue running uninterrupted. Ideally, you should only restart the component you are troubleshooting.

Read more

How to switch to root on Linux

How to switch to root on Linux

Linux users will inevitably need to log into the root account, or use administrator privileges, quite frequently. Tasks like installing or removing software, configuring system settings, adjusting file permissions, and many others usually require access to the root user account in order to perform. The root account can be accessed either by logging directly into the account, or by using the sudo Linux command to temporarily access root and execute a command with administrator privileges. In this tutorial, we will show you how to change to the root account on a Linux system, and how to use sudo to execute commands with root privileges.

Read more

How to Perform Rolling Update in Kubernetes

How to Perform Rolling Update in Kubernetes

Kubernetes offers administrators a way to update our hosted services and containerized applications without having any downtime. This is accomplished through rolling updates, which will update the application in one replica at a time, so that users accessing the service can continue without interruption. After a little time, every replica will have undergone the issued update.

Read more