Terminal Ubuntu

How To : Mount ISO files using Ubuntu terminal command line

In this video tutorial, viewers learn how to mount ISO files without burning DVD. This task is very fast, easy and simple to do. The first way is to simply right-click on the ISO file, go to Open With and select Open with "Archive Mounter". The second way is to open the Termin ...more

How To : Install Ubuntu Programs Offline with APTonCD

The Ubuntu experience has improved greatly with version 10.04, providing an easy-to-use interface. Especially when it comes to installing programs. However, it still relies on an online internet connection for installing additional software. Well, not anymore. You can collect ...more

How To : Install additional TTF fonts on Ubuntu Linux

New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to install additional TTF fonts on Ubuntu Linux. Here's the command that you can type on your terminal if you want some fa ...more

How To : Boot Ubuntu on a Macbook Using a USB, Part 2

Here is an alternative method to run Ubuntu 10.04 on a Mac without actually installing it on your internal hard disk. The idea is to install Ubuntu on your USB flash disk, instead of installing it on your internal hard drive. I'm talking about a full disk installation. It won ...more

How To : Convert webpage HTML to PDF on Ubuntu Linux

There's plenty of reasons why one would want to convert a webpage to a PDF document. And there's numerous ways on how one can convert that web page (HTML) into a PDF file. Check out this video tutorial on how to convert webpage HTML to PDF on Ubuntu Linux. You could just sele ...more

How To : Get Packet Injection Capable Drivers in Linux

In this Null Byte, we are going to be installing Packet Injection capable drivers in Linux. These are the open-source drivers required to sniff wireless traffic, inject packets to crack a wireless access point, and go into "monitor-mode". These drivers are superior because the ...more

How To : Install Firefox 3.5/3.6 on Ubuntu Linux

New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to install Firefox 3.5/3.6 and make it the default browser on Ubuntu Linux. To install the latest Firefox 3.5 (final) or F ...more

How to Hack Like a Pro : Getting Started with Metasploit

This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing p ...more

How To : Monitor hardware sensors in Ubuntu

In this tutorial, we learn how to monitor hardware sensors in Ubuntu. First, go to your Synaptic Package Manager and download any IM-Sensors you need. You will also have to download and install "hddtemp". After you do this, go to your terminal and type in "sudo sensors-detect" ...more

How To : Fix mic problems on Ubuntu Linux 10.04

If you're having some microphone troubles on your Ubuntu Linux system, this video might help you troubleshoot and solve the broken mic problem. This is about fixing the microphone input specifically. This tweak should fix it. step 1. Launch terminal and type " sudo gedit /etc ...more

How To : SSH into your iPhone/iPod Touch

This video describes about accessing an iPhone in Ubuntu using open SSH, cyber-duck, Netatalk. For accessing using SSH, make sure your iPhone's Wi-Fi connectivity is on. Now open your terminal and type "SSH root@'address'". Here address refers to the IP address of your iPhone. ...more

How To : Recover deleted files in Ubuntu using Testdisk

This video shows the method to recover deleted files in Ubuntu using Testdisk. The demonstration is done by deleting a set of pictures and recovering them later. The test disk is installed at first. Then we click on the terminal icon and go to the list options available. These ...more

How To : Enable font anti-aliasing on Wine Ubuntu Linux

New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to enable font anti-aliasing on Wine Ubuntu Linux. Type this in the terminal window Step 1. wget http://files.polosatus.r ...more

How To : Install Google Chrome when running Ubuntu Linux

This video tutorial from izbyfl shows how install Google Chrome and enable its plugins in Ubuntu. First download application from here: http://www.google.com/chrome/intl/en/eula_dev.html?dl=unstable_i386_deb. Make sure you download Gdebi Package Installer. Install applicati ...more

How To : Install SmillaEnlarger on Ubuntu Linux

Ever hear of SmillaEnlarger? It's a small graphical tool (based on QT) to resize, especially magnify bitmaps in high quality. Check out this video tutorial on how to back up and restore data easily on Ubuntu Linux. Hundreds of different solutions exist to reduce the resolutio ...more

How To : Enable USB support in VirtualBox on Ubuntu Linux

New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to enable USB support in VirtualBox on Ubuntu Linux. By default, USB support was disabled in VirtualBox, so you'll probabl ...more

How To : Download and install Zekr (Qur'an Study Tool)

New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to install Zekr (Qur'an Study Tool) on Ubuntu Linux, Windows, and Mac OS. Zekr is an open platform Quran study tool for si ...more

News : The Right Linux Distro

As many of you Null Byters may know, I was planning on writing this article a week or two ago. Better late than never! So, let's get right to it then—choosing the right Linux distro for your needs. First off, you need a base for your search. Picking a Base Right now, there ...more

Uncrackable : Secure Your Secrets with 4096-Bit Encryption

As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt ...more

How To : Run an FTP Server from Home with Linux

File Transfer Protocol, or FTP, is a network protocol made for transferring files in a client and host fashion over a Transmission Control Protocol (TCP) network, such as the internet. FTP is integrated into most browsers, and you have probably used it before. It is a common w ...more

How To : Give Your GRand Unified Bootloader a Custom Theme

GRUB, or the GRand Unified Bootloader, is a program that installs to your Master Boot Record and controls what operating system you load at boot time. Normally, it is used for multi-boot systems. Multi-boots allow you to switch between operating systems installed on seperate d ...more

How To : Defeat SSL in Practice with SSL Strip

SSL stands for Secure Socket Layer. It's an encryption standard used on most sites' login pages to avoid their users' passwords being packet sniffed in simple plain-text format. This keeps the users safe by having all of that traffic encrypted over an "https" connection. So, w ...more

How To : Spy on SSH Sessions with SSHPry2.0

SSH, or the secure shell, is a way of controlling a computer remotely from a command-line interface. While the information exchanged in the SSH session is encrypted, it's easy to spy on an SSH session if you have access to the computer that's being logged in to. Using a tool c ...more

How To : Rooted Android = Your New PenTesting Tool

No more carrying around heavy laptops and thousands of Linux Live CDs and USBs to always be ready for pentesting on the fly! I hope you had a good Christmas and happy new year! Update1: Added the section "weaponizing your Android" where I talk about apps and fundamental Kali ...more

How To : Use UFONet

With the release of the Mirai source code, botnets are back in a big way. In the early days of botnets, zombies (infected hosts) would report to IRC (Internet Relay Chat) channels for CNC (command and control) instructions. Modern botnets have evolved, but they continue to use ...more

How To : Use Pupy, a Linux Remote Access Tool

In one of my previous articles, I discussed ShinoBot, a remote administration tool that makes itself obvious. The goal is to see if the user could detect a remote administration tool or RAT on their system. In this article, I'll be demonstrating the use of Pupy, an actual RAT, ...more

How To : Use Private Encrypted Messaging Over Tor

Tor is an excellent obfuscation network for web traffic, and while instant messaging over the network is very useful, it can be relatively difficult to configure. In this guide, we'll look at two synchronous communications platforms (instant messengers) which can be routed ove ...more

How To : Up Your Linux Game with This $19.99 Bundle

When we think about operating systems, we tend to view them from the perspective of a user. After all, most of us have spent a substantial amount of time on our computers, and so we've become more than acquainted with the ins and outs of whatever system we have running on our ...more

Prev Page
  • Hot
  • Latest