Operating System Articles

Page 12 of 171

Creating dialog boxes with the Dialog Tool in Linux

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 2K+ Views

The Dialog tool is a command-line utility in Linux that allows developers to create interactive dialog boxes within shell scripts. These dialog boxes provide a user-friendly interface for displaying information, receiving input, and making selections, significantly enhancing the usability of command-line applications. Dialog boxes serve as an excellent bridge between the command line and graphical user interfaces, offering a text-based visual interaction that is both accessible and functional. This makes them particularly valuable for system administration scripts and user-interactive applications. Installing Dialog Tool Before creating dialog boxes, ensure that the Dialog tool is installed on your Linux ...

Read More

CRLFuzz – A Linux Tool to Scan CRLF Vulnerability Written in Go

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 331 Views

CRLFuzz is a powerful Linux tool written in Go that scans for CRLF (Carriage Return Line Feed) vulnerabilities in web applications. CRLF vulnerabilities occur when applications mishandle line termination characters, potentially leading to HTTP response splitting, cross-site scripting (XSS), and session hijacking attacks. This tutorial covers the installation process, demonstrates CRLFuzz usage with various command-line options, and explains how to effectively identify CRLF vulnerabilities to strengthen web application security. What are CRLF Vulnerabilities CRLF vulnerabilities arise when user input containing carriage return (\r) and line feed () characters is not properly sanitized. Attackers can exploit this to ...

Read More

How to use the “Curl” command in Linux?

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 4K+ Views

The curl command is a versatile tool in the Linux environment, enabling data transfers to and from servers using various protocols including HTTP, HTTPS, FTP, and SMTP. This command-line utility is renowned for its robustness and flexibility, making it essential for sending HTTP requests, retrieving files, uploading data, and testing APIs. Checking Curl Version Before using curl, verify its installation and version information using the --version flag. This displays version details, supported protocols, and features. $ curl --version curl 7.72.0 (x86_64-pc-linux-gnu) libcurl/7.72.0 OpenSSL/1.1.1g zlib/1.2.11 Release-Date: 2021-02-24 Protocols: dict file ftp ftps gopher http ...

Read More

Display Custom Welcome Messages on the Linux Terminal

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 2K+ Views

On Linux systems, the terminal is a powerful tool for executing commands and managing tasks. Personalizing the terminal can significantly improve user experience and make the Linux environment feel more welcoming. This article explores how to display custom welcome messages on the Linux terminal, creating a personalized greeting each time you open a terminal session. Understanding the Bashrc File The .bashrc file is a shell script that runs automatically whenever a new terminal session starts. It provides an excellent opportunity to display custom messages, system information, or motivational quotes. To begin customization, navigate to your home directory using ...

Read More

How to Block USB Storage Devices in Linux Servers?

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 4K+ Views

USB storage devices have become ubiquitous in our technology-driven world, but they also pose a significant security threat to organizations. Attackers can exploit these devices to introduce malware, steal sensitive data, or gain unauthorized access to a network. To protect Linux servers against such attacks, administrators can take proactive measures by blocking USB storage devices. This article will delve into the various ways to accomplish this, including the benefits of each approach and the necessary steps to implement them. Method 1: Using udev Rules The udev system in Linux manages devices and their files. By using udev ...

Read More

How to Brute-Force SSH in Kali Linux?

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 5K+ Views

Secure remote access is essential for both organizations and individuals in today's connected world. For secure network communication and remote system administration, SSH (Secure Shell) has gained popularity. However, SSH servers can be subject to brute-force attacks that aim to compromise their security. This article provides a comprehensive overview of brute-forcing SSH in Kali Linux, a popular system for security analysis and penetration testing. Network administrators can strengthen their defenses and guarantee the integrity of their SSH servers by understanding the mechanics of these attacks, considering ethical implications, and implementing mitigation strategies. Note − This article aims to ...

Read More

How to Connect Wi-Fi from Linux Terminal Using Nmcli Command?

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 3K+ Views

If you are a Linux user and wish to connect to a Wi-Fi network from a terminal, it may seem intimidating at first, but it is actually a simple process using the nmcli command. This article will guide you through the steps of connecting Wi-Fi from a Linux terminal using nmcli commands in a clear and easy-to-understand way. Prerequisites First, check the name of your network device by running the following command − $ iw dev You'll get output similar to this − phy#0 Interface wlan0 ...

Read More

DEBUGFS Command to Show File Creation Times in Linux

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 652 Views

The DEBUGFS command is a powerful utility in Linux that grants access to the file system of a block device. One of its notable features is its ability to reveal the creation time of a file, which cannot be easily obtained through typical Linux commands. This piece of information is stored in a data structure known as the inode, which houses diverse particulars about the file, including its creation time. To obtain this data, the DEBUGFS command accesses the inode of the file and provides a comprehensive view of the file system. This command facilitates the identification of the ...

Read More

Cr3dOv3r – Credential Reuse Attack Tool in Kali Linux

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 379 Views

Cr3dOv3r is a powerful credential reuse attack tool specifically designed for Kali Linux, a popular distribution used for penetration testing and ethical hacking. This tool helps security professionals identify whether user credentials (email/username combinations) have been compromised in data breaches or reused across multiple platforms. Credential reuse attacks exploit the common practice where users employ the same password across different services, creating significant security vulnerabilities. Installation and Setup To install Cr3dOv3r on your Kali Linux machine, follow these steps − Step 1 − Open a terminal using the keyboard shortcut Ctrl+Alt+T or by clicking the terminal icon ...

Read More

Analyze Disk Usage in Linux Using Dutree

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 376 Views

When managing Linux systems, one of the most crucial considerations is disk space management. As we accumulate files and directories, it's easy to lose track of what's consuming space and how to optimize disk usage. Dutree is a powerful command-line tool that helps analyze disk usage with an intuitive tree-like visualization. This article explores dutree in detail, covering what it is, how to use it, and the benefits it offers for analyzing disk usage in Linux systems. Whether you're a beginner or advanced user, dutree can help optimize your disk space usage and keep your system running smoothly. ...

Read More
Showing 111–120 of 1,708 articles
« Prev 1 10 11 12 13 14 171 Next »
Advertisements