15 Linux Screen Command for Dealing Terminal Sessions

The screen is a terminal multiplexer. Using this, you can run any number of console-based-applications, interactive command shells, course-based applications, etc. You can use screen to keep running program after you accidentally close the terminal, or even after you log out and later resume right wherever you are.

Source: 15 Linux Screen Command for Dealing Terminal Sessions (LinOxide)

What Is GREP and How Do You Use It?

Grep is a small Unix program for finding matching patterns. Begun as a Unix program, it can be found on Linux as well as Mac and BSD. It can read just about any text, meaning it can read input from another commands, or it can open and look through files directly. Grep is insanely useful, especially for looking through directories from the command line.

Source: What Is GREP and How Do You Use It? – Make Tech Easier

How to Take Linux System Snapshots with Timeshift

Linux shows you no mercy when you don’t have a backup. There are several backup utilities out there, including System Restore for Windows and Time Machine for Mac OS. Timeshift is an open-source software which takes incremental snapshots of your Linux file system at regular intervals, which you can restore later if you accidentally render your system unusable.

Source: How to Take Linux System Snapshots with Timeshift (LinOxide)

How to Use “ipset” to Block IPs from Country

Previously we learned how we can restrict or allow a particular country using GeoIP but in this article, we’ll cover how we can block large IP ranges using ipset module with iptables. IPset is a command line based utility which is used to administer the framework called IP sets inside the Linux kernel. An IP set may store IP addresses, networks, (TCP/UDP) port numbers, MAC addresses, interface names or combinations of them in a way, which ensures lightning speed when matching an entry against a set. It is an associative application for the iptables Linux firewall which allows us to setup rules quickly and easily to block a set of IP addresses. Here, we’ll see how we can use ipset module with iptables to block a large ranges of IP addresses in our linux based machine.

Source: How to Use “ipset” to Block IPs from Country (LinOxide)

How to Block IPs from Countries using Iptables Geoip Addons

We’ll learn how we can block traffic originated from specific country IPs using GeoIP database and linux iptables. Iptables is a command based utility program for configuring the linux kernel firewall which is implemented within the Netfilter project. Whereas GeoIP is a collection of IPs corresponding with the geographical locations where the geographical location is mapped with the IP addresses allocated at those specific organization, city, state and countries. The geographical co-ordinates in the GeoIP database are the often near the center of the population so it should not be used to identify a particular address or household. And with the help of a module called xt_geoip consisting in an iptables extension xtables-addon and the GeoIP database, we’ll perform country-based traffic filtering which helps us block or allow the traffic from a specific country.

Source: How to Block IPs from Countries using Iptables Geoip Addons (LinOxide)

Understanding Linux Permissions

Linux is a multiuser operating system. In a multiuser environment, it is necessary to ensure that a user cannot access or modify files or directories that they arent supposed to. File permissions provide a protection mechanism for controlling access to files and directories.

Linux’s file security model is based on that of Unix. Each file or directory can be accessed or modified by the user who created it, or a group of users who have been given permission to do so. Permissions can also be defined for other users that do not belong to either of these two categories.

In this guide, we will go over how file permissions work in Linux for beginners. We’ll cover how you can view the permissions associated with files and directories and also how you can change them.

Source: Understanding Linux Permissions (Linux Academy)

OpenSnitch: The Little Snitch application like firewall tool for Linux

OpenSnitch (forked version) screenshot

EDIT: The original developer apparently has abandoned OpenSnitch, however there is a forked version that as of 2021 is still being actively developed. In addition, there is a newer project by a completely different developer called eBPFSnitch. For more information on the forked version, see OpenSnitch Linux Application Firewall Fork With Improvements And Bug Fixes (LinuxUprising)

Continue reading “OpenSnitch: The Little Snitch application like firewall tool for Linux”