Memory Footprint of Processes

The amount of memory your system needs depends on the memory
requirements of the programs you run. Do you want to know how
to figure that out? It’s not as simple as adding up the amount of
memory used by each process individually, because some of that
memory can be shared. Read on to learn the details below.

One thing you should know about /proc/meminfo: This is not a real file. Instead /pro/meminfo is a virtual file that contains real-time, dynamic information about the system.

Read moreMemory Footprint of Processes

Refreshing the /boot

Every three months once kernel team releasing new stable kernel which comes with new features, Improved Hardware & System Performance. At least monthly once we will get kernel patch/update from operating system for varies fix. For best practices, i would advice users to install all the updates regularly to make the system up and running without any issue.

And /boot partition sometimes needs a bit of that attention. If you enable automatic
updates, it will fill up with old kernels that you’ll probably never need. It also will stop
you from running dnf (Dandified Packaging Tool) to install or remove anything. If you find yourself in this
situation, you can use rpm to get around it. RPM is the higher-level package manager
in Red-Hat-based distributions, and it’s very useful when dnf has “broken”.

Read moreRefreshing the /boot

Tail: End of file revealed

Tail is a core application of Unix-based systems, designed to read the end of text files. It can also be used for something else called piped-data too, but we’ll touch on that later (let’s not complicate things just yet!).
Although “reading the end of a file” sounds pretty self-explanatory, tail is a chief tool in any expert’s arsenal, with many practical uses we’ll explore along the way.

Read moreTail: End of file revealed

Detect malicious traffic with MalTrail in Linux

Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user defined lists, where trail can be anything from domain name, URL, IP address or HTTP User-Agent header value (e.g. sqlmap for automatic SQL injection and database takeover tool). Also, it uses (optional) advanced heuristic mechanisms that can help in discovery of unknown threats (e.g. new malware).
Features

  • Uses multiple public blacklists (alientvault, autoshun, badips, sblam etc)
  • Has extensive static trails for identification (domain names, URLs, IPaddresses or User-Agent values)
  • Optional heuristic mechanisms for detection of unknown threats
  • Based on Traffic -> Sensor <-> Server <-> Client Architecture
  • Web reporting interface

Read moreDetect malicious traffic with MalTrail in Linux

Build a virtual machine with VirtualBox in Linux

Virtualization is almost as old as our beloved integrated silicon chips.
At the beginning of the 1960s, there had been two major computing issues.
First, many individual mainframe models were bespoke, so incompatible.
The other stumbling block was that as integrated processors became more powerful, institutions wanted to implement flexible “timesharing” between multiple users.

VirtualBox 5.2 on Fedora

IBM dismissed this multi-user batch processing was definitely the future! But in 1963, it lost a large MIT contract to General Electric. Realising its huge mistake, IBM developed the general purpose S/360 architecture, which could be implemented on a wide range of compatible systems. In 1965, IBM released the S/360-76, the world’s first mainframe to support virtualisation. And the rest is very much history.

Read moreBuild a virtual machine with VirtualBox in Linux

Smart TV remote take-over

1 Install TakeTV DLNA/UPnP devices such as smart TVs are known to have no security at all. Now you can discover these devices and take control of them using your terminal thanks to TakeTV! Install it; clone its repository first: git clone https://github.com/SvelizDonoso/taketv.git. Then install its dependencies: sudo apt-get/dnf install youtube-dl. 2 Discover exposed devices … Read moreSmart TV remote take-over

AMD USB 3.X with kernel/IOMMU issue fix

The MSI/Gigabyte AMD motherboards are well known having several issue with USB 3.X front port in combination with Linux for long time now. and here’s how to fix that. The workaround that works is to enable IOMMU in the BIOS and then change the following line in bootmanager GRUB: (/etc/default/grub) Change GRUB_CMDLINE_LINUX=”” to GRUB_CMDLINE_LINUX=”iommu=soft” ( … Read moreAMD USB 3.X with kernel/IOMMU issue fix

Linux Speed Up! Get a faster boot-up, a swifter desktop and more responsive apps.

Everyone loves a speedy computer. In this section we’ll look at some essential tricks to speed up your computer. You don’t have to be an experienced campaigner to get more mileage out of your Linux box. There are some techniques that even new users can employ to trick their Linux distro to boot faster.

Read moreLinux Speed Up! Get a faster boot-up, a swifter desktop and more responsive apps.

Today’s the 24th first anniversary of 1st Linux kernel release.

Today’s the 24th first anniversary of 1st Linux kernel release. October 5th is the day when Linus Torvalds released the 1st Linux kernel. If you remember, back in August, we celebrated the birthday of Linux. August 25th is the day when Linus Torvalds first told the world that he was working on a project named Linux. … Read moreToday’s the 24th first anniversary of 1st Linux kernel release.

Do I need An antivirus in linux?

Afraid to answer a bit background knowledge is necessary first.
Viruses hardly exists any more. Programs that infect other executables, overwrite parts of them and/or add new code to them is not how malware spreads nowadays in most cases. In windows that distinction is not really necessary, windows users use the term “virus” to describe every form of malware (and user error, sorry, couldn’t resist 😉 ). But in Linux that distinction is important as virus scanners in Linux do exactly what the name says…they scan for viruses. They don’t protect you against attacks from websites in any form. And on top of that they hardly even scan for Linux viruses…there are only very few proof-of-concept Linux viruses at all. And due to people never installing anything themselves but always packages provided by the distro through the package manager there is almost no attack surface for traditional viruses…no spreading of .exe saying they are the most fancy screensaver or similar. So the Linux virus scanners actually mostly scan for windows viruses, for example in a mail server scanning email attachments before delivering the mails.

Read moreDo I need An antivirus in linux?