today's howtos
-
Cracking the Code: Beginner’s Guide to Unshadowing and Dumping Linux Passwords
-
How to change default browser on Linux
In the Linux environment, there are various web browsers to choose from, each offering its own set of features, speed, and security measures. As such, you might find yourself wanting to switch your default browser to one that best suits your browsing habits or requirements. Changing your default browser in Linux can also streamline your workflow by ensuring links open in your browser of choice.
-
How To Install Snap on Debian 12
In this tutorial, we will show you how to install Snap on Debian 12. Snap is a cutting-edge packaging format that offers numerous benefits over traditional package management systems. With Snap, applications and their dependencies are bundled together, ensuring seamless installation, easy updates, and secure isolation.
-
How To Install PlayOnLinux on Fedora 38
In this tutorial, we will show you how to install PlayOnLinux on Fedora 38. For those of you who didn’t know, PlayOnLinux is a free and open-source software that simplifies the installation and usage of Windows applications on Linux systems.
-
How to deploy applications using Ansible Automation Platform
In this article, we will demonstrate how to streamline the application deployment process on a Red Hat Enterprise Linux machine using Red Hat Ansible Automation Platform.
-
Alternatives to popular CLI tools: touch – change file timestamps
This article spotlights alternative tools to touch, a command to change file timestamps.
-
Mix and Match Terminal With Nautilus File Manager in Linux
Here are a few tips and tweaks to save your time by combining the terminal and the file manager in Linux.
-
Unlocking Passwords with Cain and Abel: A Comprehensive Guide for Beginners
According to the official website http://www.oxid.it/cain.html , Cain and Abel software is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kinds of passwords by sniffing the network, cracking hashes passwords using Dictionary, Brute-Force, and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analysing routing protocols.