Saturday, September 21, 2019

How to recover deleted files with foremost on Linux

In this article we will talk about foremost, a very useful open source forensic utility which is able to recover deleted files using the technique called data carving. The utility was originally developed by the United States Air Force Office of Special Investigations, and is able to recover several file types (support for specific file types can be added by the user, via the configuration file). The program can also work on partition images produced by dd or similar tools.

Read more @ https://linuxconfig.org/how-to-recover-deleted-files-with-foremost-on-linux

Install Peek Animated Gif Recorder on Ubuntu

Peek is a screen recorder with an easy to use interface. Peek makes it easy to create short screencasts of a screen area. It was built for the specific use case of recording screen areas, e.g. for easily showing UI features of your own apps or for showing a bug report.

Read more @ https://vitux.com/install-peek-animated-gif-recorder-on-ubuntu/

DAT ASS THO

This summary is not available. Please click here to view the post.

DAT ASS THO

Black Panthers and Young Patriots, An Unlikely Alliance


Can the unlikely alliance of the Black Panthers and a group of transplanted Southern Whites in 1969 hold any lesson today?

In the post-civil rights era, a militant Black Power movement emerged, with the Black Panther Party for Self Defense forming in 1966. Inspired by Malcolm X and other international black thought leaders, the group embraced armed struggle as a potential tool against organized racial oppression – a radical break from the philosophy of nonviolent protest. A large faction of the group developed in Chicago, where one of the party leaders was a young man named Fred Hampton.

One was the Young Patriot Organization (YPO), which was based in Hillbilly Harlem, an uptown neighborhood of Chicago populated by displaced white southerners. Many YPO members were racist, and they flaunted controversial symbols associated with southern pride, such as the Confederate flag. But like blacks and Latinos, the white Young Patriots and their families experienced discrimination in Chicago. In their case, it was because they were poor and from the South.Chicago in the 1960s was a brutal place for poor people. Black, brown and white people all dealt with poverty, unemployment, police violence, substandard housing, inadequate schools and a lack of social services. Ethnic and racial groups each created their own social service and activist networks to combat every kind of oppression.

Read more @ https://www.mintpressnews.com/black-panthers-and-young-patriots-an-unlikely-alliance/250949/

The Masterless People: Pirates, Maroons, and the Struggle to Live Free


In the “bizarre and horrifying world” of the early modern Caribbean, maroons and pirates both prized their freedom above all else. And sometimes they worked together to safeguard it.

Read more @ https://longreads.com/2018/10/30/the-masterless-people-pirates-maroons-and-the-struggle-to-live-free/

DAT ASS THO

DAT ASS THO

This summary is not available. Please click here to view the post.

Friday, September 20, 2019

The New American Homeless

Housing insecurity in the nation’s richest cities is far worse than government statistics claim.

Read more @ https://newrepublic.com/article/154618/new-american-homeless-housing-insecurity-richest-cities

Homeless in US: A deepening crisis on the streets of America

They seem to be almost everywhere, in places old and new, no age spared. Sleeping on cardboard or bare ground, the homeless come together under bridges and trees, their belongings in plastic bags symbolising lives on the move.

Many have arrived on the streets just recently, victims of the same prosperity that has transformed cities across the US West Coast. As officials struggle to respond to this growing crisis, some say things are likely to get worse.

Read more @ https://www.bbc.com/news/world-us-canada-45442596

 

SecTools / Netcat


This simple utility reads and writes data across TCP or UDP network connections. It is designed to be a reliable back-end tool to use directly or easily drive by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need, including port binding to accept incoming connections. The original Netcat was released by Hobbit in 1995, but it hasn't been maintained despite its popularity. It can sometimes even be hard to find a copy of the v1.10 source code. The flexibility and usefulness of this tool prompted the Nmap Project to produce Ncat, a modern reimplementation which supports SSL, IPv6, SOCKS and http proxies, connection brokering, and more.

Read more @ https://en.wikipedia.org/wiki/Netcat

SecTools / Cain and Abel


UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

Whereis Command in Linux

whereis is a command-line utility that allows you to find the location of the binary, source, and manual page files for a given command.

Read more @ https://linuxize.com/post/whereis-command-in-linux/

12 ss Command Examples to Monitor Network Connections

ss command is a tool that is used for displaying network socket related information on a Linux system. The tool displays more detailed information that the netstat command which is used for displaying active socket connections.

Read more @ https://www.tecmint.com/ss-command-examples-in-linux/

Kmdr - Display CLI Commands Explanation In Terminal

Kmdr provides CLI commands explanation for hundreds of programs. It helps you to easily learn CLI commands without leaving the terminal.

Read more @ https://www.ostechnix.com/kmdr-display-cli-commands-explanation-in-terminal/

Codeweavers Talks About Valve Partnership, Windows And The Future Of Gaming On Linux

For a staggering 23 years, the developers at Codeweavers have undertaken the gargantuan task of enabling Windows software to run on Mac and Linux operating systems.

Among other accomplishments, the company’s collective work and collaboration with Valve resulted in a massive leap forward in Linux gaming with Steam Proton. I recently sat down with Codeweavers CEO and Wine developer Andrew Eikum for an illuminating conversation about the challenges they face, working with Valve, and the future of gaming and software on Linux.

DAT ASS THO

DAT ASS THO

DAT ASS THO

This summary is not available. Please click here to view the post.

Friday, September 13, 2019

Baseball is not America's favorite pastime.. Stealing from Walmart is America's favorite pastime.. As it should be

Farts are just air turds


lol @ morons on FB who think I am a Russian bot because I use the word, comrade


lol


Huawei Just Started Selling Laptops With A Beautiful Linux OS Pre-Installed

Some of the best and most affordable premium laptops on the market are now shipping with Linux pre-installed. More specifically they’re shipping with Deepin, a beautiful and polished desktop Linux distribution which, like Huawei, are based in China. Whether this is a result of the ongoing trade dispute between the United States and China is unknown, but it’s a nice step forward for the proliferation of Linux alternatives promoted by major OEMs like Dell and Lenovo.

Read more @ https://www.forbes.com/sites/jasonevangelho/2019/09/12/huawei-just-started-selling-laptops-with-deepin-linux-pre-installed/#2364d7947824

How to Allow Remote Connections to MySQL Database Server

By default, the MySQL server listens for connections only from localhost.

Read more @ https://linuxize.com/post/mysql-remote-access/

Black Caesar: The Tribal War Chief Turned Pirate (Pirate History Explained)

Black Caesar was beast of a man with incredible strength. He was able to submerge his own boat underwater to avoid pursuers and would later serve along side Blackbeard himself.

Check it out @ https://www.youtube.com/watch?v=1ng6OacqowI

Rare Jack Johnson Documentary

@ https://www.youtube.com/watch?v=IWHpEUelQzs

DAT ASS THO






SecTools / Metasploit


Metasploit took the security world by storm when it was released in 2004. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits, as you can see in their list of modules. This makes writing your own exploits easier, and it certainly beats scouring the darkest corners of the Internet for illicit shellcode of dubious quality. One free extra is Metasploitable, an intentionally insecure Linux virtual machine you can use for testing Metasploit and other exploitation tools without hitting live servers.

Metasploit was completely free, but the project was acquired by Rapid7 in 2009 and it soon sprouted commercial variants. The Framework itself is still free and open source, but they now also offer a free-but-limited Community edition, a more advanced Express edition ($5,000 per year per user), and a full-featured Pro edition.

The Metasploit Framework now includes an official Java-based GUI and also Raphael Mudge's excellent Armitage. The Community, Express, and Pro editions have web-based GUIs.

Get it @ https://www.metasploit.com/

SecTools / Wireshark


Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source multi-platform network protocol analyzer. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types. A tcpdump-like console version named tshark is included. One word of caution is that Wireshark has suffered from dozens of remotely exploitable security holes, so stay up-to-date and be wary of running it on untrusted or hostile networks (such as security conferences).

Get it @ https://www.wireshark.org/

DAT ASS THO

This summary is not available. Please click here to view the post.

Granny is a cock tease

@ https://xhamster.com/videos/granny-is-a-cock-tease-8078459

Super Jiggly BBW Pawg Milf in Blue Dress

@ https://xhamster.com/videos/super-jiggly-bbw-pawg-milf-in-blue-dress-6416199

Hacker Documentary: Unauthorized Access by Annaliza Savage [1994]

This is a nostalgic hacker documentary about the early to mid 90s computer underground. Featuring old skool alpha geeks like Phiber Optik, once a member of the legendary hacker groups Legion of Doom and Masters of Deception. Plenty of cool interviews with the early 2600 crew in NYC, the l0pht, and even a bit on Agent Steal aka Justin Tanner Petersen who snitched on Kevin Poulsen. Also phone phreaking with a red box! Brace for lulz.

Check it out @ https://www.youtube.com/watch?v=fDk82bLYscg