If you have Ubuntu Linux, if you don't already know, there's something called Advanced Desktop Effects, and once enabled, gives you multiple desktop effects for your Ubuntu system. This video show you how to install Advanced Desktop Effects and shows you all the goodies, and d ...more
Ubuntu Linux is capable of many cool effects that other systems don't offer. This video tutorial will show you how to enable all of these effects, such as minimizing and maximizing windows. What? All operating systems do that, right? Yes, but this video will help you to select ...more
No other operating system can create this awesome effect. Sure, not many people will want to use this fire effect, but this is just one of the many perks of owning a Ubuntu system. This video will show you how to use this fire paint effect via an eye candy plugin that enables ...more
This video covers the Expo plugin in Ubuntu Linux, which is similar to the Exposé feature in Mac OS X. The Expo feature can be found in the Advanced Desktop Effects Manager. Once you enable it and tweak the options, you'll be able to view multiple workspace areas at once and m ...more
This video tutorial will show you how to get a cool flaming cursor effect in Ubuntu Linux. The steps are easy to follow, and this effect may also work on other flavors of Linux, too. Watch this video, follow the steps and you'll be getting your own flaming cursor in no time at ...more
New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to install KDE 4.3 Plasma on [k] Ubuntu Linux. After six months of development, the K Desktop Environment 4.3.0 was launch ...more
New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to install Frozen Bubble 2 on Ubuntu Linux. Tested on Ubuntu 9.04 Beta (soon to be RC). Colorful 3D rendered penguin anim ...more
If you like the way Compiz works, then you'll love this browser-based compositing windows manager for Firefox. It's an add-on you can install in any Firefox web browser, whether on Windows, Mac or Linux computers. If you are into eye-candy and are always looking for ways to i ...more
In this tutorial, we learn how to remove noise from audio files in Ubuntu with Audacity. To do this, you will first open up Audacity and then open up your audio file. To get rid of the noise, you will highlight the area with just the noise, not anything else. Now, go to 'effec ...more
Want a cool text effect? It's easy in GIMP. Watch this video tutorial to learn how to create a simple neon glowing text in GIMP. GIMP runs both on Linux and Windows. Google it if you want to try it. It's a Photoshop alternative. Tru3m0sl3m has all kinds of tutorials, from Wi ...more
Gloobus Coverflow is a new program on Linux that lets you view all of your files without actually opening them! It's very similar to Apple's Quicklook, but is made for Linux. New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not ...more
Many windows users, if not all, run into a virus infection once in a while. This is unavoidable when using Microsoft's operating system. Without digressing too much, the fact that Windows is such a popular OS with no controlled software sources makes it easy for viruses and ma ...more
After installing Ubuntu as your primary OS, you should have protected against USB Rubber Ducky payloads, defended against hard drive forensics, and reduced the overall attack surface against physical strikes. When defending against network-based attacks, you'll want to minimiz ...more
Transferring hundreds of screenshots, webcam recordings, keystroke logs, and audio recordings between your VPS and a local Kali machine can be tricky. Services like Dropbox don't always have the best privacy policies and suffer data breaches just like any other website. To mit ...more
Hackers often rely on lazy system admins and unpatched vulnerabilities to get access to a host. Keeping intruders off of our machines requires us to update daily, only run the services we need, and read the code, among other things, but we can still make mistakes. Luckily for ...more
If you've ever needed to prove you have remote access to a device, or simply want a way to convince someone their computer is haunted, SSH can be used to make a device begin to show signs of being possessed. Spooky Action at a Distance If you need to prove you've got remote ...more
Your social security number, credit card information, and medical history can fall into the wrong hands if you're not careful about how and where you share your data online. If you really care about your data, there are tools and techniques you can utilize to protect yourself ...more
In October of 2017, Mathy Vanhoef released "Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2." This paper demonstrates a way to decrypt traffic on practically any WPA2 network, the most commonly used form of wireless security (seeing as all other forms of Wi-Fi encrypti ...more
Analysis of photographs and social connections can be a huge component of social engineering. Understanding who a person is, as well as who they know, can establish links within a company. This information could be used by hackers to execute elaborate social engineering attack ...more
Windows 10 and macOS have poor reputations when it comes to customer privacy and user policies. Our hacking Windows 10 and hacking macOS articles might make it seem like a reasonably secure operating system doesn't exist. But I'm here to tell you that there is a viable alterna ...more
A man-in-the-middle attack, or MitM attack, is when a hacker gets on a network and forces all nearby devices to connect to their machine directly. This lets them spy on traffic and even modify certain things. Bettercap is one tool that can be used for these types of MitM attac ...more
Rooting. As an Android user, I'm sure you've heard the word once or twice. According to Kaspersky, 7.6% of all Android users root — but for the 92.4% who don't, we wanted to talk to you. Rooting allows you to remove barriers and open Android to a level of unprecedented contro ...more
You've protected your Ubuntu system from physical attacks, annoyed network hackers, and sandboxed potentially malicious applications. Great! Now, the next logical steps to locking down your OS include thoroughly auditing Ubuntu for weak points, using antivirus software that re ...more