Memory Footprint of Processes

The amount of memory your system needs depends on the memory
requirements of the programs you run. Do you want to know how
to figure that out? It’s not as simple as adding up the amount of
memory used by each process individually, because some of that
memory can be shared. Read on to learn the details below.

One thing you should know about /proc/meminfo: This is not a real file. Instead /pro/meminfo is a virtual file that contains real-time, dynamic information about the system.

Read moreMemory Footprint of Processes

Refreshing the /boot

Every three months once kernel team releasing new stable kernel which comes with new features, Improved Hardware & System Performance. At least monthly once we will get kernel patch/update from operating system for varies fix. For best practices, i would advice users to install all the updates regularly to make the system up and running without any issue.

And /boot partition sometimes needs a bit of that attention. If you enable automatic
updates, it will fill up with old kernels that you’ll probably never need. It also will stop
you from running dnf (Dandified Packaging Tool) to install or remove anything. If you find yourself in this
situation, you can use rpm to get around it. RPM is the higher-level package manager
in Red-Hat-based distributions, and it’s very useful when dnf has “broken”.

Read moreRefreshing the /boot

Tail: End of file revealed

Tail is a core application of Unix-based systems, designed to read the end of text files. It can also be used for something else called piped-data too, but we’ll touch on that later (let’s not complicate things just yet!).
Although “reading the end of a file” sounds pretty self-explanatory, tail is a chief tool in any expert’s arsenal, with many practical uses we’ll explore along the way.

Read moreTail: End of file revealed

Playing Grand Theft Auto V (Steam) on Linux without struggle

Howdy Linux gamer’s, since the release of Steam Play in Augustus playing Windows triple-A games on Linux became simplicity. Except for GTA5, getting it working on Steam it isnt that easy, lots of tweaking is required as seen in this GTA 5’s compatibility list.

Linux Gaming in growing

Well for those who still did not gave up the hope, here’s a tutorial for getting GTA5 fully playable on your beloved Linux distro. because it works perfectly on mine Fedora!

Read morePlaying Grand Theft Auto V (Steam) on Linux without struggle

Detect malicious traffic with MalTrail in Linux

Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user defined lists, where trail can be anything from domain name, URL, IP address or HTTP User-Agent header value (e.g. sqlmap for automatic SQL injection and database takeover tool). Also, it uses (optional) advanced heuristic mechanisms that can help in discovery of unknown threats (e.g. new malware).
Features

  • Uses multiple public blacklists (alientvault, autoshun, badips, sblam etc)
  • Has extensive static trails for identification (domain names, URLs, IPaddresses or User-Agent values)
  • Optional heuristic mechanisms for detection of unknown threats
  • Based on Traffic -> Sensor <-> Server <-> Client Architecture
  • Web reporting interface

Read moreDetect malicious traffic with MalTrail in Linux

Build a virtual machine with VirtualBox in Linux

Virtualization is almost as old as our beloved integrated silicon chips.
At the beginning of the 1960s, there had been two major computing issues.
First, many individual mainframe models were bespoke, so incompatible.
The other stumbling block was that as integrated processors became more powerful, institutions wanted to implement flexible “timesharing” between multiple users.

VirtualBox 5.2 on Fedora

IBM dismissed this multi-user batch processing was definitely the future! But in 1963, it lost a large MIT contract to General Electric. Realising its huge mistake, IBM developed the general purpose S/360 architecture, which could be implemented on a wide range of compatible systems. In 1965, IBM released the S/360-76, the world’s first mainframe to support virtualisation. And the rest is very much history.

Read moreBuild a virtual machine with VirtualBox in Linux

Smart TV remote take-over

1 Install TakeTV DLNA/UPnP devices such as smart TVs are known to have no security at all. Now you can discover these devices and take control of them using your terminal thanks to TakeTV! Install it; clone its repository first: git clone https://github.com/SvelizDonoso/taketv.git. Then install its dependencies: sudo apt-get/dnf install youtube-dl. 2 Discover exposed devices … Read moreSmart TV remote take-over

Facebook gathers data for data mining operations used by data brokers

When it comes to mass spying, the best game in town is not CIA or any of the alphabet soup agencies. Private companies and data brokers have been doing data collection on a massive scale, and given their advanced statistical methods, this information can say a lot about a person. In fact, I’d say that what they have is better than what the alphabet soup has, and their data has a lot of implications.

facebook-privacy

This started when companies like Amazon realized that they can make a profit every step of the way: sell items to customers, sell customers’ data to data brokers. Data brokering has since become much bigger, and so the data collection methods have also become much more extensive. There are many ways to gather mass data, and these are just the ones I can think of off the top of my head: first, many websites straight up sell their data to brokers. This includes many online vendors, all kinds of popular sites (not all of them, but some of them), adult entertainment sites, you name it. If those sites do not sell data, dishonest brokers can and do embed tracking ads on sites that accept them, revealing a user’s entire browsing history. Then of course there are companies like Google, that sell user search histories.

Read moreFacebook gathers data for data mining operations used by data brokers

How to protect your privacy by blocking all annoying Spotify ads & analytics in Linux, OSX and Windows with hosts file.

Today I will show you how to easily block the servers hosting Spotify ads on your Linux/Mac or Windows machine with a hosts file. This will allow you to listen all day long on a free account without hearing a single ad. This trick is very simple, legal and works great. Spotify may catch on and find some way to stop this from working but, as of today (15 July 2019) it works swimmingly.


spotify-ad-block

Blocking Ad Server

In order to remove those pesky ads, all we need to do is setup out hosts file to override the DNS for Spotify’s ad servers and redirect that traffic to our local machine. When the traffic hits out local machine the call will fail and the ad will be skipped. Follow the steps below to add the entries needed.

Read moreHow to protect your privacy by blocking all annoying Spotify ads & analytics in Linux, OSX and Windows with hosts file.

Make your AdBlock invisible to most sites that require you to disable AdBlock.

The Anti-Adblock Killer Script has not been updated for quite a while now. Most sites can sniff it.
adblock
Fortunately, there are a few alternatives. I have been using the uBlock Protector Extension (Chrome only) for the past month and it works flawlessly. It is also updated frequently.

Read moreMake your AdBlock invisible to most sites that require you to disable AdBlock.