HackDig : Dig high-quality web security articles for hackers

Introducing iVerify, the security toolkit for iPhone users

“If privacy matters, it should matter to the phone your life is on.” So says Apple in their recent ads about Privacy on the iPhone and controlling the data you share—but many of the security features they highlight are opt-in, and users often don’t know when or how to activate them. But hey… we got your back! Today, Trail of Bits launched i
Publish At:2019-11-14 15:25 | Read:1258 | Comments:0 | Tags:Apple Education Exploits Guides iVerify Press Release Privac

Install MariaDB Galera Cluster on Ubuntu 16.04

Today I’m glad to publish a guest post about Galera a software that I’ve used in the past to manage a multi-master mysql cluster: MariaDB Galera Cluster is a multi-master cluster for MariaDB. MariaDB Galera Cluster currently supports only the InnoDB/XtraDB storage engine. It is mostly used for database redundancy as it consists of multiple master
Publish At:2019-10-18 04:40 | Read:1357 | Comments:0 | Tags:Guides cluster galera mariadb mysql

Useful Resources for Those Who Want to Know More About Linux

Guest post by Lucy Benton Linux is one of the most popular and versatile operating systems available. It can be used on a smartphone, computer and even a car. Linux has been around since the 1990s and is still one of the most widespread operating systems. Linux is actually used to run most of the Internet as it is considered to be rather stable compared to
Publish At:2019-10-18 04:40 | Read:1849 | Comments:0 | Tags:Articles Guides course learning linux operating systems reso

Useful steps to Install Linux Mint on your PC

Guest Post by Oliver. Linux Mint is one of the most powerful and elegant Operating system. The purpose of launching a Linux Mint in the market is to provide the modern and comfortable OS which is easy to use for every user. The best thing about Linux Mint is that it is both free and Open Source. Also, it comes at the third position after Microsoft Windows an
Publish At:2016-11-19 20:55 | Read:6396 | Comments:0 | Tags:Articles Guides installation linux mint rosa

Storing large binary files in git repositories

This is a small update (1 year later) of a great article by Ilmari Kontulainen, first posted on blog.deveo.com. I’ll post the original article in blockquote and my notes in green. Storing large binary files in Git repositories seems to be a bottleneck for many Git users. Because of the decentralized nature of Git, which means every developer has the fu
Publish At:2016-11-19 20:55 | Read:5808 | Comments:0 | Tags:Guides Opinion Reviews git git lfs git-annex large files vcs

Paas and continuos integration

Today I want to repost a great article first posted on sysadvent blog. I think it’s a great post that show how to integrate different software to achieve a modern continuos integration. Original article by: Written by: Paul Czarkowski (@pczarkowski) Edited by: Dan Phrawzty (@phrawzty) Docker and the ecosystem around it have done some great things for d
Publish At:2016-11-19 20:55 | Read:5981 | Comments:0 | Tags:Articles Guides alias continuos integration ghost infrastruc

Top Five Mobile Devices That Run Linux

Article submitted by Mark In a market that is churning Android powered device after another Android powered device and the obligatory Apple update to its iPhone and iPad brands, it is no wonder people need to look elsewhere if they want to experience something different in the mobile segment. We aren’t really disrespecting Apple and Google’s effo
Publish At:2015-12-24 23:30 | Read:4398 | Comments:0 | Tags:Articles Guides phone smartphone tizen ubuntu

Should You Use a VPN With Linux?

Article By Cassie Philips. Linuxaria has been one of my go-to sources for Linux tips and information ever since I discovered it a couple of months ago. I would strongly suggest reading this post on managing processes with cgroup, as it is an example of the quality of their content. Linux being one of the quickest rising operating systems available to compute
Publish At:2015-11-17 07:25 | Read:7135 | Comments:0 | Tags:Articles Guides data gnu/Linux linux privacy security VPN

Yum and repository tools by examples

Like every year it’s time once again to read the sysadvent blog, a great source of interesting article. This one it’s an article of one year ago, but still really useful and interesting Written by: Michael Stahnke (@stahnma) Edited by: Adam Compton (@comptona) Over the years, I have mentored quite a few System Administrators. Levelling up means l
Publish At:2014-12-19 21:40 | Read:5290 | Comments:2 | Tags:Articles Guides packages RedHat sysadvent yum

Linux: Timeouting commands in shell scripts

Article by Mikko Ohtamaa first posted on his blog Often you want to automatize something using shell scripting. In a perfect world your script robot works for you without getting tired, without hick-ups, and you can just sit at the front of your desk and sip coffee. Then we enter the real world: Your network is disconnected. DNS goes downs. Your HTTP hooks
Publish At:2014-10-12 21:05 | Read:4517 | Comments:0 | Tags:Articles Guides bash dns linux operating system script timeo

Linux Terminal: An lsof Primer

Article by Daniel Miessler first posted on his blog lsof is the sysadmin/security über-tool. I use it most for getting network connection related information from a system, but that’s just the beginning for this powerful and too-little-known application. The tool is aptly called lsof because it “lists openfiles“. And remember, in UNIX just about everything
Publish At:2014-09-30 22:10 | Read:5605 | Comments:0 | Tags:Guides linux lsof open source terminal

How to check if you are vulnerable to shellshock

The most new and dangerous bug around it’s the one called “shellshock”, this is a security bug in the widely used Unix Bash shell which was disclosed on 24 September 2014. Many Internet daemons, such as web servers, use Bash to process certain commands, allowing an attacker to cause vulnerable versions of Bash to execute arbitrary commands.
Publish At:2014-09-30 01:10 | Read:4530 | Comments:0 | Tags:Guides News attackers bash bug computers linux server web sh

How to change an user password under Linux

If you manage a server with many different users or just your family computer you will probably have many different accounts to manage, and one important aspect of any account it’s its password. In this small article I’ll show you how to use the basic passwd command but also how to do some small bash script or use a web application, if you have a
Publish At:2014-08-29 22:10 | Read:4285 | Comments:0 | Tags:Guides bash ldap linux passwd password script terminal

How to reboot Linux automatically on Kernel Panic

Luckily this problem don’t happen so frequently, at least using stable kernel and distributions, but sometime your beloved Linux could go in “Kernel Panic”. A kernel panic is an action taken by an operating system upon detecting an internal fatal error from which it cannot safely recover. The term is largely specific to Unix and Unix-like
Publish At:2014-08-23 21:00 | Read:4360 | Comments:0 | Tags:Guides kernel Kernel Panic linux operating system sysctl Sys

Linux Terminal: speedtest_cli checks your real bandwidth speed.

What’s your upload and download speed at home (or in your office) ? Are you really sure that you get what do you pay for to your ISP ? To test the speed of our internet connection There are several internet services such as SpeedTest a web service that is available both from Web browsers and mobile application. Now you can easily check it also with sp
Publish At:2014-08-20 11:00 | Read:7763 | Comments:0 | Tags:Guides bandwidth download speed getdeb install linux net spe


Share high-quality web security related articles with you:)