Skip to content
iDoLinux

Linux How Tos And Tutorials

  • Home
  • About
  • Contact
Subscribe

Posts by geekvater

  • Home
  • geekvater
Avatar for geekvater
About geekvater
Kali Linux 2025.1c: Key Fix, Interface Improvements, and New Tools for Security Pros
Posted inNews

Kali Linux 2025.1c: Key Fix, Interface Improvements, and New Tools for Security Pros

Kali Linux remains one of the most trusted operating systems for penetration testing and cybersecurity tasks. With the release of version 2025.1c, the developers addressed several critical issues affecting users…
Posted by Avatar for geekvater geekvater June 25, 2025
Understanding the 'nobody' User in Linux and Unix
Posted inCLI Magic

Understanding the ‘nobody’ User in Linux and Unix

Understanding the 'nobody' user in Linux and Unix systems is essential for anyone managing services and processes. On these systems, processes typically run under specific users for better isolation and…
Posted by Avatar for geekvater geekvater June 24, 2025
New udisks Vulnerability Allows Local Users to Gain Root on Major Linux Distributions
Posted inHow To Install

New udisks Vulnerability Allows Local Users to Gain Root on Major Linux Distributions

A newly disclosed vulnerability chain affecting the Linux udisks service can allow unprivileged users to escalate privileges to root on many major Linux distributions. This comes as yet another reminder…
Posted by Avatar for geekvater geekvater June 23, 2025
CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability (CVE‑2023‑0386)
Posted inNews

CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability (CVE‑2023‑0386)

On June 18, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical Linux kernel vulnerability, CVE‑2023‑0386, to its Known Exploited Vulnerabilities (KEV) catalog. This flaw, found in…
Posted by Avatar for geekvater geekvater June 20, 2025
How to Restrict Users to FTP Access Only on Linux
Posted inCLI Magic

How to Restrict Users to FTP Access Only on Linux

There are situations when you want to allow a user to access a system solely through FTP, while blocking all other forms of access like SSH or shell logins. This…
Posted by Avatar for geekvater geekvater June 4, 2025
New Pumabot Botnet Brute-Forces SSH Credentials to Hijack IoT Devices
Posted inNews

New Pumabot Botnet Brute-Forces SSH Credentials to Hijack IoT Devices

In today’s connected world, IoT devices are becoming increasingly common, powering everything from home automation to industrial systems. However, this rapid growth has also expanded the attack surface for cybercriminals.…
Posted by Avatar for geekvater geekvater June 4, 2025
How to Check if a Package Is Installed on Debian, RedHat And Derivative Systems
Posted inCLI Magic

How to Check if a Package Is Installed on Debian, RedHat And Derivative Systems

Verifying whether a package is installed on your Linux system is a fundamental step, especially when debugging issues or managing configurations. The process varies depending on the package manager used…
Posted by Avatar for geekvater geekvater June 2, 2025
How to Give Passwordless Root Privileges to a Normal User
Posted inCLI Magic

How to Give Passwordless Root Privileges to a Normal User

Granting passwordless root privileges can streamline workflows, especially when managing multiple automated processes or scripts that require administrative access. If you're already familiar with changing a user's default shell, the…
Posted by Avatar for geekvater geekvater June 2, 2025
How to Change a User's Default Shell in Linux
Posted inCLI Magic

How to Change a User’s Default Shell in Linux

Managing user environments is an essential part of Linux system administration. One powerful way to personalize or restrict user sessions is by changing the default login shell. In this article,…
Posted by Avatar for geekvater geekvater May 31, 2025
The Ultimate Guide for Creating and Removing Directories
Posted inCLI Magic

The Ultimate Guide for Creating and Removing Directories

Working with directories is a fundamental part of navigating and organizing your Linux system. Whether you're setting up project structures or managing application files, knowing how to create and remove…
Posted by Avatar for geekvater geekvater May 31, 2025

Posts pagination

1 2 3 … 19 Next page

Recent Posts

  • Kali Linux 2025.1c: Key Fix, Interface Improvements, and New Tools for Security Pros
  • Understanding the ‘nobody’ User in Linux and Unix
  • New udisks Vulnerability Allows Local Users to Gain Root on Major Linux Distributions
  • CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability (CVE‑2023‑0386)
  • How to Restrict Users to FTP Access Only on Linux

Recent Comments

  1. Kali Linux 2025.1c: Key Fix, Interface Improvements, and New Tools for Security Pros - iDoLinux on How to Check if a Package Is Installed on Debian, RedHat And Derivative Systems
  2. Kali Linux 2025.1c: Key Fix, Interface Improvements, and New Tools for Security Pros - iDoLinux on How to Change a User’s Default Shell in Linux
  3. Understanding the ‘nobody’ User in Linux and Unix - iDoLinux on How to Change a User’s Default Shell in Linux
  4. New udisks Vulnerability Allows Local Users to Gain Root on Major Linux Distributions - iDoLinux on CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability (CVE‑2023‑0386)
  5. CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability (CVE‑2023‑0386) - iDoLinux on How to Restrict Users to FTP Access Only on Linux

Archives

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025

Categories

  • 3D Modeling
  • Audio Editing Software
  • CAD Software
  • CLI Magic
  • How To Install
  • Internet Browsers
  • Kernel 6.10
  • Kernel 6.11
  • Kernel 6.12
  • Kernel 6.13
  • Kernel 6.14
  • Kernel 6.15
  • Kernel 6.9
  • LaTeX Editors
  • Linux Distros
  • Messaging Apps
  • News
  • Photo Editing Software
  • Remote Control Software
  • Text Editors And IDEs
  • Torrent clients
  • Video And Audio Players
Other pages
  • Cookie Policy
  • Terms and Conditions
  • Privacy Policy
Copyright 2025 — iDoLinux. All rights reserved. Bloghash WordPress Theme
Scroll to Top