Welcome to Our Community

While Linux.org has been around for a while, we recently changed management and had to purge most of the content (including users). If you signed up before April 23rd, 2017 please sign up again. Thanks!

  1. Note: we recently updated out site software, please report any unseen issues - we do this often to insure your information is secure.
    Dismiss Notice
Having access to a constant music of your liking is a great achievement of the Internet. Most people have a Pandora account, but are unable to play Pandora on their Linux System. A program called...
An NMAP FTP Bounce Attack is similar in nature to an Idle Scan Attack. The requirement for the Bounce Attack is a File Transfer Protocol (FTP) Server with FXP.

The File eXchange Protocol (FXP) is...
Announced on their G+ page, cPanel has added a new Application Manager UI and updated Ruby in the new version 66 of cPanel.

"The Application...
A Raspberry Pi, as most of you probably know, is a brand of a single-board computer that, because of its size, has many uses from home automation to arcade machines to home lab servers.

Two...
There are many things that Linux admins do to try and keep their servers as secure as possible. Adding a good firewall and intrusion detection software package is always a great idea. Also, it...
Yesterday, Matthew Miller, the Fedora Project Manager did an AMA (Ask Me Anything) on reddit. AMAs are great because it connects regular people to those that most think aren't easily accessible...
Linux systems use some type of Boot Loader which is especially needed if the system is used to boot to more than one Operating System (OS). The GNU GRand Unified Bootloader (GRUB) is only one...
I am sure there have been times, for those of you who have multiple PCs in the home, when you wish you could be sitting in front of a different system for a few minutes. You hate having to go to...
A lot of Linux users may use OpenShot Video Editor to edit and manipulate videos. The Editor is a very powerful tool for those who wish to create or manipulate videos. This article will cover...
Idle Scans are performed against a Target System without any traffic occurring between the Source and Target Systems. The Idle Scan is accomplished by using a third system to pass requests between...