Skip to main content

Home/ Future of the Web/ Group items matching "command" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Gonzalo San Gil, PhD.

Top 3 Online Resources For Learning The Command Line - 1 views

  •  
    "If you've been using Linux or OS X for a couple of years, you must have run into the command line (or the terminal) at some point. It could have been a command to fix a problem or enable a feature. These days it's easy to just ignore the command line. And for most users, GUI is really enough."
  •  
    "If you've been using Linux or OS X for a couple of years, you must have run into the command line (or the terminal) at some point. It could have been a command to fix a problem or enable a feature. These days it's easy to just ignore the command line. And for most users, GUI is really enough."
Gonzalo San Gil, PhD.

5 Linux Command Line Based Tools for Downloading Files and Browsing Websites - 0 views

  •  
    "Linux command-line, the most adventurous and fascinating part of GNU/Linux is very cool and powerful tool. command line itself is very productive and the availability of various inbuilt and third party command line application makes Linux robust and powerfu"
  •  
    "Linux command-line, the most adventurous and fascinating part of GNU/Linux is very cool and powerful tool. command line itself is very productive and the availability of various inbuilt and third party command line application makes Linux robust and powerfu"
Gonzalo San Gil, PhD.

How To Find My Public IP Address From Command Line On a Linux - 0 views

  •  
    "How do I find out my public IP address on the Linux and OS X Unix command line to use with my own bash shell script without using third party web site? Is there command-line option which will show my dynamic IP address on a Ubuntu or Fedora Linux?"
Gonzalo San Gil, PhD.

30 Useful Linux Commands for System Administrators - 0 views

  •  
    "In this article we are going to review some of the useful and frequently used Linux or Unix commands for Linux System Administrators that are used in their daily life. This is not a complete but it's a compact list"
  •  
    "In this article we are going to review some of the useful and frequently used Linux or Unix commands for Linux System Administrators that are used in their daily life. This is not a complete but it's a compact list"
Gonzalo San Gil, PhD.

Linux Command Line Cheat Sheet by DaveChild - Cheatography.com: Cheat Sheets For Every Occasion - 0 views

  •  
    "A cheat sheet of the commands I use most for Linux, with popup links to man pages." [# ! Bacause a Huge #Memory... # ! ...is not all # ! that makes a (#Free) #Techie... # ! ✌☺]
  •  
    "A cheat sheet of the commands I use most for Linux, with popup links to man pages."
Gonzalo San Gil, PhD.

Linux and Unix Port Scanning With netcat [nc] Command - 1 views

  •  
    "by Vivek Gite on July 12, 2007 last updated November 27, 2015 in Linux, Networking, UNIX How do I find out which ports are opened on my own server? How do I run port scanning using the nc command instead of the nmap command on a Linux or Unix-like systems?"
Paul Merrell

Update: EU hits Microsoft with new antitrust charges - 0 views

  • January 16, 2009 (Computerworld) Microsoft Corp. confirmed today that European Union regulators have formally accused the company of breaking antitrust laws by including the company's Internet Explorer (IE) browser with the Windows operating system. "Yesterday, Microsoft received a Statement of Objections from the Directorate General for Competition of the European Commission," the company said in a statement on Friday. "The Statement of Objections expresses the Commission's preliminary view that the inclusion of Internet Explorer in Windows since 1996 has violated European competition law." According to Microsoft, the EU claimed that "other browsers are foreclosed from competing because Windows includes Internet Explorer."
Gonzalo San Gil, PhD.

Install YouTube-DL - A Command Line Video Download Tool for Linux - 0 views

  •  
    "youtube-dl is a Python based small command-line tool that allows to download videos from YouTube.com, Dailymotion, Google Video, Photobucket, Facebook, Yahoo, Metacafe, Depositfiles and few more similar sites. It written in pygtk and requires Python interpreter to run this program, it's not platform restricted. It should run on any Unix, Windows or in Mac OS X based systems."
Gonzalo San Gil, PhD.

Command Line Tool to Monitor Linux Containers Performance - 0 views

  •  
    "ctop is a new command line based tool available to monitor the processes at the container level. Containers provide operating system level virtualization environment by making use of the cgroups resource management functionality. This tool collects data related to memory, cpu, block IO and metadata like owner, uptime etc from cgroups and presents it in a user readable format so that one can quickly asses the overall health of the system. Based on the data collected, it tries to guess the underlying container technology. ctop is useful in detecting who is using large amounts of memory under low memory situations."
  •  
    "ctop is a new command line based tool available to monitor the processes at the container level. Containers provide operating system level virtualization environment by making use of the cgroups resource management functionality. This tool collects data related to memory, cpu, block IO and metadata like owner, uptime etc from cgroups and presents it in a user readable format so that one can quickly asses the overall health of the system. Based on the data collected, it tries to guess the underlying container technology. ctop is useful in detecting who is using large amounts of memory under low memory situations."
Gonzalo San Gil, PhD.

How to access SoundCloud from the command line in Linux - Linux FAQ - 0 views

  •  
    "Posted on July 18, 2014 by Adrien Brochard Leave a comment If you enjoy music streaming and originally-created sounds, you cannot have missed SoundCloud. Based in Germany, this cloud streaming service is now famous and well-established for any music adventurer. And naturally, as a Linux enthusiast, you might wonder how to join your passion for Linux with your love for music. As a solution, I advise you to check out Soundcloud2000, a command line client for SoundCloud born out of the Music Hack Day Stockholm '13."
Gonzalo San Gil, PhD.

How To Use Nmap Security Scanner (Nmap Commands) - LinuxAndUbuntu - 1 views

  •  
    "Nmap is a great security scanner. Many systems and network administrators use it for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. In this article, I'll guide you through how to use Nmap commands."
Gonzalo San Gil, PhD.

Network Commands - 0 views

  •  
    "Table of Contents Network Configuration Internet Specific Commands Remote Administration Related"
Gonzalo San Gil, PhD.

transfer.sh - Easy and fast file sharing from the command-line. - 0 views

  •  
    "Easy file sharing from the command line"
Gonzalo San Gil, PhD.

Manage Passwords From The Command Line With `Pass` ~ Web Upd8: Ubuntu / Linux blog - 0 views

  •  
    "pass` is a simple, flexible command line password manager that follows the Unix philosophy. The application saves each password in an encrypted GPG file and allows organizing them in various folder hierarchies."
Gonzalo San Gil, PhD.

Linux Guide: Linux Basic Commands - 2 views

  •  
    The Future is Open... and Free. ✌☺
Gonzalo San Gil, PhD.

3 file conversion tools for the Linux command line | Opensource.com - 1 views

  •  
    "Recently, a friend innocently asked me how many file formats there are. My semi-serious response was, "Think of a soup bowl filled with beach sand.""
  •  
    "Recently, a friend innocently asked me how many file formats there are. My semi-serious response was, "Think of a soup bowl filled with beach sand.""
Paul Merrell

Commentary: Don't be so sure Russia hacked the Clinton emails | Reuters - 0 views

  • By James Bamford Last summer, cyber investigators plowing through the thousands of leaked emails from the Democratic National Committee uncovered a clue.A user named “Феликс Эдмундович” modified one of the documents using settings in the Russian language. Translated, his name was Felix Edmundovich, a pseudonym referring to Felix Edmundovich Dzerzhinsky, the chief of the Soviet Union’s first secret-police organization, the Cheka.It was one more link in the chain of evidence pointing to Russian President Vladimir Putin as the man ultimately behind the operation.During the Cold War, when Soviet intelligence was headquartered in Dzerzhinsky Square in Moscow, Putin was a KGB officer assigned to the First Chief Directorate. Its responsibilities included “active measures,” a form of political warfare that included media manipulation, propaganda and disinformation. Soviet active measures, retired KGB Major General Oleg Kalugin told Army historian Thomas Boghart, aimed to discredit the United States and “conquer world public opinion.”As the Cold War has turned into the code war, Putin recently unveiled his new, greatly enlarged spy organization: the Ministry of State Security, taking the name from Joseph Stalin’s secret service. Putin also resurrected, according to James Clapper, the U.S. director of national intelligence, some of the KGB’s old active- measures tactics. On October 7, Clapper issued a statement: “The U.S. Intelligence community is confident that the Russian government directed the recent compromises of emails from U.S. persons and institutions, including from U.S. political organizations.” Notably, however, the FBI declined to join the chorus, according to reports by the New York Times and CNBC.A week later, Vice President Joe Biden said on NBC’s Meet the Press that "we're sending a message" to Putin and "it will be at the time of our choosing, and under the circumstances that will have the greatest impact." When asked if the American public would know a message was sent, Biden replied, "Hope not." Meanwhile, the CIA was asked, according to an NBC report on October 14, “to deliver options to the White House for a wide-ranging ‘clandestine’ cyber operation designed to harass and ‘embarrass’ the Kremlin leadership.”But as both sides begin arming their cyberweapons, it is critical for the public to be confident that the evidence is really there, and to understand the potential consequences of a tit-for-tat cyberwar escalating into a real war. 
  • This is a prospect that has long worried Richard Clarke, the former White House cyber czar under President George W. Bush. “It’s highly likely that any war that began as a cyberwar,” Clarke told me last year, “would ultimately end up being a conventional war, where the United States was engaged with bombers and missiles.”The problem with attempting to draw a straight line from the Kremlin to the Clinton campaign is the number of variables that get in the way. For one, there is little doubt about Russian cyber fingerprints in various U.S. campaign activities. Moscow, like Washington, has long spied on such matters. The United States, for example, inserted malware in the recent Mexican election campaign. The question isn’t whether Russia spied on the U.S. presidential election, it’s whether it released the election emails.Then there’s the role of Guccifer 2.0, the person or persons supplying WikiLeaks and other organizations with many of the pilfered emails. Is this a Russian agent? A free agent? A cybercriminal? A combination, or some other entity? No one knows.There is also the problem of groupthink that led to the war in Iraq. For example, just as the National Security Agency, the Central Intelligence Agency and the rest of the intelligence establishment are convinced Putin is behind the attacks, they also believed it was a slam-dunk that Saddam Hussein had a trove of weapons of mass destruction. Consider as well the speed of the political-hacking investigation, followed by a lack of skepticism, culminating in a rush to judgment. After the Democratic committee discovered the potential hack last spring, it called in the cybersecurity firm CrowdStrike in May to analyze the problem.
  • CrowdStrike took just a month or so before it conclusively determined that Russia’s FSB, the successor to the KGB, and the Russian military intelligence organization, GRU, were behind it. Most of the other major cybersecurity firms quickly fell in line and agreed. By October, the intelligence community made it unanimous. That speed and certainty contrasts sharply with a previous suspected Russian hack in 2010, when the target was the Nasdaq stock market. According to an extensive investigation by Bloomberg Businessweek in 2014, the NSA and FBI made numerous mistakes over many months that stretched to nearly a year. “After months of work,” the article said, “there were still basic disagreements in different parts of government over who was behind the incident and why.”  There was no consensus­, with just a 70 percent certainty that the hack was a cybercrime. Months later, this determination was revised again: It was just a Russian attempt to spy on the exchange in order to design its own. The federal agents also considered the possibility that the Nasdaq snooping was not connected to the Kremlin. Instead, “someone in the FSB could have been running a for-profit operation on the side, or perhaps sold the malware to a criminal hacking group.” Again, that’s why it’s necessary to better understand the role of Guccifer 2.0 in releasing the Democratic National Committee and Clinton campaign emails before launching any cyberweapons.
  • ...2 more annotations...
  • t is strange that clues in the Nasdaq hack were very difficult to find ― as one would expect from a professional, state-sponsored cyber operation. Conversely, the sloppy, Inspector Clouseau-like nature of the Guccifer 2.0 operation, with someone hiding behind a silly Bolshevik cover name, and Russian language clues in the metadata, smacked more of either an amateur operation or a deliberate deception.Then there’s the Shadow Brokers, that mysterious person or group that surfaced in August with its farcical “auction” to profit from a stolen batch of extremely secret NSA hacking tools, in essence, cyberweapons. Where do they fit into the picture? They have a small armory of NSA cyberweapons, and they appeared just three weeks after the first DNC emails were leaked. On Monday, the Shadow Brokers released more information, including what they claimed is a list of hundreds of organizations that the NSA has targeted over more than a decade, complete with technical details. This offers further evidence that their information comes from a leaker inside the NSA rather than the Kremlin. The Shadow Brokers also discussed Obama’s threat of cyber retaliation against Russia. Yet they seemed most concerned that the CIA, rather than the NSA or Cyber Command, was given the assignment. This may be a possible indication of a connection to NSA’s elite group, Tailored Access Operations, considered by many the A-Team of hackers.“Why is DirtyGrandpa threating CIA cyberwar with Russia?” they wrote. “Why not threating with NSA or Cyber Command? CIA is cyber B-Team, yes? Where is cyber A-Team?” Because of legal and other factors, the NSA conducts cyber espionage, Cyber Command conducts cyberattacks in wartime, and the CIA conducts covert cyberattacks. 
  • The Shadow Brokers connection is important because Julian Assange, the founder of WikiLeaks, claimed to have received identical copies of the Shadow Brokers cyberweapons even before they announced their “auction.” Did he get them from the Shadow Brokers, from Guccifer, from Russia or from an inside leaker at the NSA?Despite the rushed, incomplete investigation and unanswered questions, the Obama administration has announced its decision to retaliate against Russia.  But a public warning about a secret attack makes little sense. If a major cyber crisis happens in Russia sometime in the future, such as a deadly power outage in frigid winter, the United States could be blamed even if it had nothing to do with it. That could then trigger a major retaliatory cyberattack against the U.S. cyber infrastructure, which would call for another reprisal attack ― potentially leading to Clarke’s fear of a cyberwar triggering a conventional war. President Barack Obama has also not taken a nuclear strike off the table as an appropriate response to a devastating cyberattack.
  •  
    Article by James Bamford, the first NSA whistleblower and author of three books on the NSA.
Gonzalo San Gil, PhD.

10 Tips to Push Your Git Skills to the Next Level - 1 views

  •  
    " Published June 17, 2014 Tweet Subscribe Recently we published a couple of tutorials to get you familiar with Git basics and using Git in a team environment. The commands that we discussed were about enough to help a developer survive in the Git world. In this post, we will try to explore how to manage your time effectively and make full use of the features that Git provides."
  •  
    " Published June 17, 2014 Tweet Subscribe Recently we published a couple of tutorials to get you familiar with Git basics and using Git in a team environment. The commands that we discussed were about enough to help a developer survive in the Git world. In this post, we will try to explore how to manage your time effectively and make full use of the features that Git provides."
Gonzalo San Gil, PhD.

Free Software Foundation statement on the GNU Bash "shellshock" vulnerability - Free Software Foundation - working together for free software - 0 views

  •  
    "by Free Software Foundation - Published on Sep 25, 2014 04:51 PM A major security vulnerability has been discovered in the free software shell GNU Bash. The most serious issues have already been fixed, and a complete fix is well underway. GNU/Linux distributions are working quickly to release updated packages for their users. All Bash users should upgrade immediately, and audit the list of remote network services running on their systems. " [# ! + http://security.stackexchange.com/questions/68168/is-there-a-short-command-to-test-if-my-server-is-secure-against-the-shellshock-b]
  •  
    "by Free Software Foundation - Published on Sep 25, 2014 04:51 PM A major security vulnerability has been discovered in the free software shell GNU Bash. The most serious issues have already been fixed, and a complete fix is well underway. GNU/Linux distributions are working quickly to release updated packages for their users. All Bash users should upgrade immediately, and audit the list of remote network services running on their systems. "
Gonzalo San Gil, PhD.

How Fedora monitors upstream releases - Fedora Magazine - 0 views

  •  
    "Have you updated your Fedora system recently? Hopefully you do this regularly. Updates fix various bugs and even add new features to your most loved applications. An update, to our users, is generally a notification from the Software application. If you're an advanced user and prefer the command line, the process is simple:"
  •  
    "Have you updated your Fedora system recently? Hopefully you do this regularly. Updates fix various bugs and even add new features to your most loved applications. An update, to our users, is generally a notification from the Software application. If you're an advanced user and prefer the command line, the process is simple:"
1 - 20 of 60 Next › Last »
Showing 20 items per page