In this article we will talk about foremost, a very useful open source
forensic utility which is able to recover deleted files using the
technique called data carving. The utility was originally developed by
the United States Air Force Office of Special Investigations, and is
able to recover several file types (support for specific file types can
be added by the user, via the configuration file). The program can also
work on partition images produced by dd or similar tools.
Read more @ https://linuxconfig.org/how-to-recover-deleted-files-with-foremost-on-linux
Saturday, September 21, 2019
Install Peek Animated Gif Recorder on Ubuntu
Peek is a screen recorder with an easy to use interface. Peek makes it
easy to create short screencasts of a screen area. It was built for the
specific use case of recording screen areas, e.g. for easily showing UI
features of your own apps or for showing a bug report.
Read more @ https://vitux.com/install-peek-animated-gif-recorder-on-ubuntu/
Read more @ https://vitux.com/install-peek-animated-gif-recorder-on-ubuntu/
Black Panthers and Young Patriots, An Unlikely Alliance
Can the unlikely alliance of the Black Panthers and a group of transplanted Southern Whites in 1969 hold any lesson today?
In the post-civil rights era, a militant Black Power movement emerged, with the Black Panther Party for Self Defense forming in 1966. Inspired by Malcolm X and other international black thought leaders, the group embraced armed struggle as a potential tool against organized racial oppression – a radical break from the philosophy of nonviolent protest. A large faction of the group developed in Chicago, where one of the party leaders was a young man named Fred Hampton.
One was the Young Patriot Organization (YPO), which was based in Hillbilly Harlem, an uptown neighborhood of Chicago populated by displaced white southerners. Many YPO members were racist, and they flaunted controversial symbols associated with southern pride, such as the Confederate flag. But like blacks and Latinos, the white Young Patriots and their families experienced discrimination in Chicago. In their case, it was because they were poor and from the South.Chicago in the 1960s was a brutal place for poor people. Black, brown and white people all dealt with poverty, unemployment, police violence, substandard housing, inadequate schools and a lack of social services. Ethnic and racial groups each created their own social service and activist networks to combat every kind of oppression.
Read more @ https://www.mintpressnews.com/black-panthers-and-young-patriots-an-unlikely-alliance/250949/
The Masterless People: Pirates, Maroons, and the Struggle to Live Free
In the “bizarre and horrifying world” of the early modern Caribbean, maroons and pirates both prized their freedom above all else. And sometimes they worked together to safeguard it.
Read more @ https://longreads.com/2018/10/30/the-masterless-people-pirates-maroons-and-the-struggle-to-live-free/
Friday, September 20, 2019
The New American Homeless
Housing insecurity in the nation’s richest cities is far worse than government statistics claim.
Homeless in US: A deepening crisis on the streets of America
They seem to be almost everywhere, in places old and new, no age spared. Sleeping on cardboard or bare ground, the homeless come together under bridges and trees, their belongings in plastic bags symbolising lives on the move.
Many have arrived on the streets just recently, victims of the same prosperity that has transformed cities across the US West Coast. As officials struggle to respond to this growing crisis, some say things are likely to get worse.
Read more @ https://www.bbc.com/news/world-us-canada-45442596
Many have arrived on the streets just recently, victims of the same prosperity that has transformed cities across the US West Coast. As officials struggle to respond to this growing crisis, some say things are likely to get worse.
Read more @ https://www.bbc.com/news/world-us-canada-45442596
SecTools / Netcat
This simple utility reads and writes data across TCP or UDP network connections. It is designed to be a reliable back-end tool to use directly or easily drive by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need, including port binding to accept incoming connections. The original Netcat was released by Hobbit in 1995, but it hasn't been maintained despite its popularity. It can sometimes even be hard to find a copy of the v1.10 source code. The flexibility and usefulness of this tool prompted the Nmap Project to produce Ncat, a modern reimplementation which supports SSL, IPv6, SOCKS and http proxies, connection brokering, and more.
Read more @ https://en.wikipedia.org/wiki/Netcat
SecTools / Cain and Abel
UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.
Whereis Command in Linux
whereis is a command-line utility that allows you to find the location
of the binary, source, and manual page files for a given command.
Read more @ https://linuxize.com/post/whereis-command-in-linux/
Read more @ https://linuxize.com/post/whereis-command-in-linux/
12 ss Command Examples to Monitor Network Connections
ss command is a tool that is used for displaying network socket related
information on a Linux system. The tool displays more detailed
information that the netstat command which is used for displaying active
socket connections.
Read more @ https://www.tecmint.com/ss-command-examples-in-linux/
Read more @ https://www.tecmint.com/ss-command-examples-in-linux/
Kmdr - Display CLI Commands Explanation In Terminal
Kmdr provides CLI commands explanation for hundreds of programs. It
helps you to easily learn CLI commands without leaving the terminal.
Read more @ https://www.ostechnix.com/kmdr-display-cli-commands-explanation-in-terminal/
Read more @ https://www.ostechnix.com/kmdr-display-cli-commands-explanation-in-terminal/
Codeweavers Talks About Valve Partnership, Windows And The Future Of Gaming On Linux
For a staggering 23 years, the developers
at Codeweavers have undertaken the gargantuan task of enabling Windows
software to run on Mac and Linux operating systems.
Among other accomplishments, the
company’s collective work and collaboration with Valve resulted in a
massive leap forward in Linux gaming with Steam Proton. I recently sat
down with Codeweavers CEO and Wine developer Andrew Eikum for an
illuminating conversation about the challenges they face, working with
Valve, and the future of gaming and software on Linux.
Friday, September 13, 2019
Huawei Just Started Selling Laptops With A Beautiful Linux OS Pre-Installed
Some of the best and most affordable premium laptops on the market are now shipping with Linux pre-installed. More specifically they’re shipping with Deepin, a beautiful and polished desktop Linux distribution which, like Huawei, are based in China. Whether this is a result of the ongoing trade dispute between the United States and China is unknown, but it’s a nice step forward for the proliferation of Linux alternatives promoted by major OEMs like Dell and Lenovo.
Read more @ https://www.forbes.com/sites/jasonevangelho/2019/09/12/huawei-just-started-selling-laptops-with-deepin-linux-pre-installed/#2364d7947824
Read more @ https://www.forbes.com/sites/jasonevangelho/2019/09/12/huawei-just-started-selling-laptops-with-deepin-linux-pre-installed/#2364d7947824
How to Allow Remote Connections to MySQL Database Server
By default, the MySQL server listens for connections only from localhost.
Read more @ https://linuxize.com/post/mysql-remote-access/
Read more @ https://linuxize.com/post/mysql-remote-access/
Black Caesar: The Tribal War Chief Turned Pirate (Pirate History Explained)
Black Caesar was beast of a man with incredible strength. He was able to
submerge his own boat underwater to avoid pursuers and would later
serve along side Blackbeard himself.
Check it out @ https://www.youtube.com/watch?v=1ng6OacqowI
Check it out @ https://www.youtube.com/watch?v=1ng6OacqowI
SecTools / Metasploit
Metasploit took the security world by storm when it was released in 2004. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits, as you can see in their list of modules. This makes writing your own exploits easier, and it certainly beats scouring the darkest corners of the Internet for illicit shellcode of dubious quality. One free extra is Metasploitable, an intentionally insecure Linux virtual machine you can use for testing Metasploit and other exploitation tools without hitting live servers.
Metasploit was completely free, but the project was acquired by Rapid7 in 2009 and it soon sprouted commercial variants. The Framework itself is still free and open source, but they now also offer a free-but-limited Community edition, a more advanced Express edition ($5,000 per year per user), and a full-featured Pro edition.
The Metasploit Framework now includes an official Java-based GUI and also Raphael Mudge's excellent Armitage. The Community, Express, and Pro editions have web-based GUIs.
Get it @ https://www.metasploit.com/
SecTools / Wireshark
Wireshark (known as Ethereal until a trademark dispute in Summer 2006)
is a fantastic open source multi-platform network protocol analyzer. It
allows you to examine data from a live network or from a capture file on
disk. You can interactively browse the capture data, delving down into
just the level of packet detail you need. Wireshark has several powerful
features, including a rich display filter language and the ability to
view the reconstructed stream of a TCP session. It also supports
hundreds of protocols and media types. A tcpdump-like
console version named tshark is included. One word of caution is that
Wireshark has suffered from dozens of remotely exploitable security
holes, so stay up-to-date and be wary of running it on untrusted or
hostile networks (such as security conferences).
Get it @ https://www.wireshark.org/
Hacker Documentary: Unauthorized Access by Annaliza Savage [1994]
This is a nostalgic hacker documentary about the early to mid 90s
computer underground. Featuring old skool alpha geeks like Phiber Optik,
once a member of the legendary hacker groups Legion of Doom and Masters
of Deception. Plenty of cool interviews with the early 2600 crew in
NYC, the l0pht, and even a bit on Agent Steal aka Justin Tanner
Petersen who snitched on Kevin Poulsen. Also phone phreaking with a red
box! Brace for lulz.
Check it out @ https://www.youtube.com/watch?v=fDk82bLYscg
Check it out @ https://www.youtube.com/watch?v=fDk82bLYscg
Subscribe to:
Posts (Atom)