Files in Linux have 3 types of timestamps: atime (access), mtime (modify) and ctime (change). Someday you may have a situation when you would like to fake a timestamps of some file. atime and mtime timestamps can be easily changed using touch command, but there is no a standard way to set a different ctime […]
From the following article you will learn how to clear or remove the last login information on a Linux server from the command line. On the Linux systems there are three standard commands that show the information about last logged in users: last, lastb, and lastlog.
In this article i will explain how to stay anonymous during port scanning with Nmap (utility for network discovery and security auditing). I’ll show how to perform an anonymous port scanning through the Tor network, using ProxyChains utility. I’ll also show how to get round a situation where scan fails, because Tor endpoints are blocked. […]
Most digital cameras and cell phone add EXIF metadata to the images. EXIF metadata includes camera specifications, settings, location (GPS coordinates) and more. If you’re worried about the privacy, you may want to anonymize your images and photos by removing all the EXIF metadata. In this small guide, i’ll show how to read and then […]
This guide describes how to install Tor Client on the Debian based systems like Linux Mint, Ubuntu etc. Tor or The Onion Router – is an encrypted network that can route your traffic through relays, making the traffic appear to come from exit nodes. Unlike with proxies, the exit node itself doesn’t know your IP […]
This tutorial describes how to install and set up DNSCrypt on Debian based systems, like Linux Mint, Ubuntu etc. DNSCrypt Proxy – is a tool for securing communications between a client and a DNS resolver. It encrypts DNS requests using the DNSCrypt Protocol and pass them to an upstream server, by default OpenDNS. Resolving dependencies […]
Sometimes you don’t want to leave Bash history, because it may contain some sensitive data (e.g. passwords, tokens, etc.). This article will help you to take a full control on your .bash_history file. I will show how to clear the commands history for the current Bash session, how to prevent particular commands from being recorded […]
To use a proxy on the Linux command-line, you can set the environment variables http_proxy, https_proxy or ftp_proxy, depending on the traffic type. These proxy server settings are used by the almost all Linux command-line utilities, e.g. ftp, wget, curl, ssh, apt-get, yum and others. If you don’t know yet which proxy server to use, […]