•  ru
ShellHacks
Command-Line Tips and Tricks

anonymity

  • Blog

Linux – Fake File Access, Modify and Change TimeStamps

Posted on Tuesday December 27th, 2016Monday July 3rd, 2017by admin

Files in Linux have 3 types of timestamps: atime (access), mtime (modify) and ctime (change). Someday you may have a situation when you would like to fake a timestamps of some file. atime and mtime timestamps can be easily changed using touch command, but there is no a standard way to set a different ctime […]

Read More
5 Comments
  • Blog

HowTo: Clear or Remove Last Login History in Linux

Posted on Tuesday December 27th, 2016Tuesday March 21st, 2017by admin

From the following article you will learn how to clear or remove the last login information on a Linux server from the command line. On the Linux systems there are three standard commands that show the information about last logged in users: last, lastb, and lastlog.

Read More
4 Comments
  • Blog

Anonymous Port Scanning: Nmap + Tor + ProxyChains

Posted on Tuesday December 27th, 2016Saturday March 18th, 2017by admin

In this article i will explain how to stay anonymous during port scanning with Nmap (utility for network discovery and security auditing). I’ll show how to perform an anonymous port scanning through the Tor network, using ProxyChains utility. I’ll also show how to get round a situation where scan fails, because Tor endpoints are blocked. […]

Read More
8 Comments
  • Blog

Removing EXIF Data From Images and Photos in Linux

Posted on Tuesday December 27th, 2016Monday August 20th, 2018by admin

Most digital cameras and cell phone add EXIF metadata to the images. EXIF metadata includes camera specifications, settings, location (GPS coordinates) and more. If you’re worried about the privacy, you may want to anonymize your images and photos by removing all the EXIF metadata. In this small guide, i’ll show how to read and then […]

Read More
7 Comments
  • Blog

HowTo: Install Tor on Linux – Ubuntu/Debian/Mint etc.

Posted on Tuesday December 27th, 2016Monday March 30th, 2020by admin

This guide describes how to install Tor Client on the Debian based systems like Linux Mint, Ubuntu etc. Tor or The Onion Router – is an encrypted network that can route your traffic through relays, making the traffic appear to come from exit nodes. Unlike with proxies, the exit node itself doesn’t know your IP […]

Read More
No comments yet
  • Blog

Encrypt DNS Traffic With DNSCrypt

Posted on Tuesday December 27th, 2016Friday February 24th, 2017by admin

This tutorial describes how to install and set up DNSCrypt on Debian based systems, like Linux Mint, Ubuntu etc. DNSCrypt Proxy – is a tool for securing communications between a client and a DNS resolver. It encrypts DNS requests using the DNSCrypt Protocol and pass them to an upstream server, by default OpenDNS. Resolving dependencies […]

Read More
3 Comments
  • Blog

HowTo: Clear BASH History

Posted on Tuesday December 27th, 2016Friday February 24th, 2017by admin

Sometimes you don’t want to leave Bash history, because it may contain some sensitive data like passwords. This article may help you to control your Bash history file. Clear Bash history completely Type the following command to clear all your Bash history: $ history -cw Option Description -c Clear the history list -w Write out […]

Read More
3 Comments
  • Blog

Linux Proxy Server Settings – Set Proxy For Command Line

Posted on Tuesday December 27th, 2016Tuesday March 21st, 2017by admin

To use a proxy on the Linux command-line, you can set the environment variables http_proxy, https_proxy or ftp_proxy, depending on the traffic type. These proxy server settings are used by the almost all Linux command-line utilities, e.g. ftp, wget, curl, ssh, apt-get, yum and others. If you don’t know yet which proxy server to use, […]

Read More
4 Comments

Tags

access-control anonymity ansible apache archive artifactory aws bash boot cmd command-line curl dns docker encryption git java jenkins kubernetes linux mail mongodb mysql network nmap openssl oracle password pdf performance powershell prometheus proxy python rabbitmq raspberry pi redis ssh systemd telnet text-processing tor tsm windows yum
  • Twitter
  • RSS
Privacy
Copyright © 2011-2020 | www.ShellHacks.com
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok