Linux

From Hidden Wiki
Jump to navigation Jump to search
Unix Assembly language Mathematics Web development I2P
GhostBSD Assembly Programming Tutorial Statistics Django for Beginners MuWire
GUI Artificial intelligence Artificial neural network Machine learning Messenger
Tkinter Artificial intelligence Artificial neural network Machine Learning Mastery with Python Session

Linux (/ˈlɪnəks/) is an operating system. It is regarded as one of Unix OSes. If you concern your security, you should use Linux. Because it is an open source software, there is no backdoor.


Ubuntu is an example of Linux.


Frequently used commands

You can use commands in the terminal.


ls

"ls" command shows the list of directories and files.


cd and ./

"cd" command changes a directory.

For example, in your home directory, if you type "cd tor-browser_en-US/", then the directory changes to "tor-browser_en-US/". It is same to "cd ./tor-browser_en-US/".

"." means your current directory.

".." stands for your upper directory.

If you input "cd ..", then your directory changes into the upper directory.

If you are in "tor-browser_en-US/" directory, you can excute Tor Browser. Just type "./s" and press "Tab" key, then "./start-tor-browser.desktop". will be automatically completed.

Not confuse "cd ./example" with "./example". "cd ./example" is changing a directory and "./example" is excuting a file.

passwd

Type following passwd command to change your own password:

$ passwd


You need to login as the root user, type the following command to change password for user vivek:

# passwd vivek

OR

$ sudo passwd vivek

rm

To delete a single file, use the "rm" command followed by the file name:

rm filename


To remove an empty directory, use either rmdir or rm -d followed by the directory name:

rm -d dirname
rmdir dirname


To remove non-empty directories and all the files within them, use the rm command with the-r (recursive) option:

rm -r dirname

If a directory or a file within the directory is write-protected, you will be prompted to confirm the deletion.


To remove non-empty directories and all the files without being prompted, use rm with the -r (recursive) and -f options:

rm -rf dirname

mv

For example, to move the file file1 from the current working directory to the /tmp directory you would run:

mv file1 /tmp


To rename a file you need to specify the destination file name:

mv file1 file2


The syntax for moving directories is the same as when moving files. In the following example, if the dir2 directory exists, the command will move dir1 inside dir2. If dir2 doesn’t exist, dir1 will be renamed to dir2:

mv dir1 dir2

memory usage

See memory usage.

free


See options. --help display this help and exit

free --help


-h, --human show human-readable output

free -h
free --human


--si use powers of 1000 not 1024

free --si

disk usage

See disk usage.

df


See options. --help display this help and exit

df --help


-h, --human-readable print sizes in powers of 1024 (e.g., 1023M)

df -h
df --human-readable


-H, --si print sizes in powers of 1000 (e.g., 1.1G)

df -H
df --si

List of Linux distributions

Debian

  • Tails: Tails serves as a pre-configured out-of-box secure OS which can be easily loaded onto removable media. Its ease of use while still forcing a secure protocol makes this OS a great contender. It's based on Debian. All its outgoing connections are forced to go through Tor, and non-anonymous connections are blocked. https://tails.boum.org/
  • Whonix: As with Tails, Whonix forces all communication through the Tor network. However, Whonix uses VirtualBox to usd a VM to ensure isolation of the user from the network. As such, it is a little more complex to setup and maintain. Nonetheless, Whonix serves as a viable alternative to the Tails OS for any user who wishes to keep a persistent OS on disk. It's based on Debian. https://www.whonix.org/


  • Kali Linux: While not geared towards being out of the box secure, Kali is a powerful tool to exploit network vulnerabilities. This OS comes prepackaged with tools to collect and analyze data in your network as well as having software for anti-forensics. If you have ever wanted to know how secure your system/network is - bombard it with Kali. Kali Linux is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. Kali Linux is a complete re-build of BackTrack from the ground up, adhering completely to Debian development standards. https://www.kali.org/



Red Hat


NSA request

Linus Torvalds, the founder of Linux kernel joked during a LinuxCon keynote 18 September 2013, that the NSA, who is the founder of SELinux, wanted a backdoor in the original kernel. However later, Linus' father, Member of the European Parliament (MEP), revealed that the NSA actually did this.

When my oldest son [Linus Torvalds] was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, [but] everybody understood that the NSA had approached him. -- Nils Torvalds, LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens - 11th Hearing, 11 November 2013


Hot to mount an external H.D.D.

See Ubuntu.

Change a passphrase of LUKS

For more detail, see Ubuntu.

See also