Files in Linux have 3 types of timestamps: atime (access), mtime (modify) and ctime (change). Someday you may have a situation when you would like to fake a timestamps of some file. atime and mtime timestamps can be easily changed using touch command, but there is no a standard way to set a different ctime […]
anonymity
HowTo: Clear or Remove Last Login History in Linux
From the following article you will learn how to clear or remove the last login information on a Linux server from the command line. On the Linux systems there are three standard commands that show the information about last logged in users: last, lastb, and lastlog.
Anonymous Port Scanning: Nmap + Tor + ProxyChains
In this article i will explain how to stay anonymous during port scanning with Nmap (utility for network discovery and security auditing). I’ll show how to perform an anonymous port scanning through the Tor network, using ProxyChains utility. I’ll also show how to get round a situation where scan fails, because Tor endpoints are blocked. […]
Removing EXIF Data From Images and Photos in Linux
Most digital cameras and cell phone add EXIF metadata to the images. EXIF metadata includes camera specifications, settings, location (GPS coordinates) and more. If you’re worried about the privacy, you may want to anonymize your images and photos by removing all the EXIF metadata. In this small guide, i’ll show how to read and then […]
HowTo: Install Tor on Linux – Ubuntu/Debian/Mint etc.
This guide describes how to install Tor Client on the Debian based systems like Linux Mint, Ubuntu etc. Tor or The Onion Router – is an encrypted network that can route your traffic through relays, making the traffic appear to come from exit nodes. Unlike with proxies, the exit node itself doesn’t know your IP […]
Encrypt DNS Traffic With DNSCrypt
This tutorial describes how to install and set up DNSCrypt on Debian based systems, like Linux Mint, Ubuntu etc. DNSCrypt Proxy – is a tool for securing communications between a client and a DNS resolver. It encrypts DNS requests using the DNSCrypt Protocol and pass them to an upstream server, by default OpenDNS. Resolving dependencies […]
HowTo: Clear BASH History
Sometimes you don’t want to leave Bash history, because it may contain some sensitive data (e.g. passwords, tokens, etc.). This article will help you to take a full control on your .bash_history file. I will show how to clear the commands history for the current Bash session, how to prevent particular commands from being recorded […]
Linux Proxy Server Settings – Set Proxy For Command Line
To use a proxy on the Linux command-line, you can set the environment variables http_proxy, https_proxy or ftp_proxy, depending on the traffic type. These proxy server settings are used by the almost all Linux command-line utilities, e.g. ftp, wget, curl, ssh, apt-get, yum and others. If you don’t know yet which proxy server to use, […]