Advanced Networking in Linux: VLANs, Bonding, and Bridging

In the world of Linux, networking is a vast and powerful realm that enables users to configure their systems for a wide range of scenarios. From simple home networks to complex enterprise environments, Linux provides robust tools and configurations that can optimize network performance, enhance security, and ensure reliability. This post delves into advanced networking configurations in Linux, focusing on three critical aspects: Virtual Local Area Networks (VLANs), network bonding, and network bridging. These configurations are essential for network administrators and enthusiasts looking to leverage the full potential of their Linux systems. ...

June 21, 2024 · 6 min · 1211 words · Omid Farhang

Advanced Shell Scripting Techniques: Automating Complex Tasks with Bash

Bash scripting, a cornerstone of Unix and Linux system administration, offers powerful tools to automate repetitive tasks, streamline workflows, and handle complex operations. For those already comfortable with basic scripting, diving into advanced techniques can unlock new levels of efficiency and capability. This post will explore advanced shell scripting techniques in Bash, focusing on script optimization, robust error handling, and automating complex system administration tasks. Script Optimization Optimization is crucial for ensuring that your scripts run efficiently, especially when dealing with large datasets or intensive tasks. Here are some key techniques to optimize your Bash scripts. ...

June 19, 2024 · 5 min · 980 words · Omid Farhang

Linux Malware targets WordPress and common Plugins

Doctor Web has discovered a malicious Linux program that hacks websites based on a WordPress CMS. It exploits 30 vulnerabilities in a number of plugins and themes for this platform. If sites use outdated versions of such add-ons, lacking crucial fixes, the targeted webpages are injected with malicious JavaScripts. As a result, when users click on any area of an attacked page, they are redirected to other sites. What they can do? Upon their command, it is able to perform the following actions: ...

January 15, 2023 · 2 min · 337 words · Omid Farhang

How to Upgrade Ubuntu

Update Release Name in Sources To start upgrading you need to change the /etc/apt/sources.list file and replace the name of your previous release with new one. So, for example if you are 20.04, replace every instance of focal with kinetic. If you currently have 22.04, replace jammy with kinetic. This process can be automated by using the following sed command: 1 ...

December 30, 2022 · 1 min · 207 words · Omid Farhang

How to Upgrade Ubuntu Kernel

Ubuntu by default uses LTS Kernels: Canonical provides long-term support (LTS) kernels for Ubuntu LTS releases. Canonical also provides interim operating system releases with updated kernels every 6 months. For customers and business partners that don’t have specialised bleeding-edge workloads or latest hardware needs, the latest LTS release ”-generic” kernel is the best option for them such as the 4.15 default kernel in Ubuntu 18.04 LTS. Customers who need the latest hardware support capability can install the latest HWE kernel such as the ones contained in interim releases, keeping in mind the shorter support lifespan associated with these kernels (9 months). HWE kernel customers are recommended to upgrade to a newer LTS release that supports their hardware and/or software needs as soon as it is available. Another option for customers is to use point releases. For example, there is an 18.04.4 point release as of February 2020, which includes an updated 5.3.x kernel but is also considered LTS, exactly like the original GA 4.15 kernel in 18.04. ...

December 30, 2022 · 2 min · 401 words · Omid Farhang

Cross-platform botnet targets SSH-enabled devices

Microsoft researchers found a cross-platform botnet that originates from malicious software downloads on Windows devices & succeeds in propagating to a variety of Linux-based devices by enumerating default credentials on internet-exposed SSH-enabled devices. Microsoft researchers observed that the initial infection points related to the botnet were devices infected through the installation of malicious cracking tools that purport to acquire illegal Windows licenses. The cracking tools contain additional code that downloads and launches a fake version of svchost.exe through a PowerShell command. In some cases, the downloaded file is named svchosts.exe. ...

December 12, 2022 · 1 min · 109 words · Omid Farhang

How To Use Cloudflare WARP On Linux

What is WARP? The Cloudflare WARP client allows individuals and organizations to have a faster, more secure, and more private experience online. The WARP client sits between your device and the Internet, and has several connection modes to better suit different needs. Install Installing Warp Client (aka Cloudflare Zero Trust Client) is so easy, specially if your OS uses AUR. AUR Use your AUR helper to find and install cloudflare-warp-bin, for example I use yay here: ...

November 27, 2022 · 2 min · 233 words · Omid Farhang

Google Chrome in Ubuntu keeps detecting network change

Recently I had problem with my Ubuntu, Whenever I tried to open a website my Chromium told me that a Network Change has been detected and after 1-2 reload that sites would load and sometimes failed to load fully. After looking up for that problem, I found out many other people had same problem and it has something to do with “avahi-daemon”. Solution According to the links I found in Ubuntu forums, this problem comes from IPv6 in Ubuntu and disabling that service will fix it, I tried it and it worked: ...

July 6, 2017 · 1 min · 139 words · Omid Farhang

Security vulnerability in NVIDIA's proprietary Linux drivers fixed

The H-Online: A new version of NVIDIA’s proprietary UNIX graphics drivers for Linux, Solaris and FreeBSD fixes a security vulnerability (CVE-2012-0946) that allowed attackers to read and write arbitrary system memory in order to, for example, obtain root privileges. To take advantage of the vulnerability, an attacker must have access permission for some device files – which, for systems with these drivers, is typically the case for users who can launch a graphical interface as 3D acceleration and some other features cannot be used otherwise. ...

April 12, 2012 · 1 min · 213 words · Omid Farhang

Pinguy OS 11.04 Pre-Alpha Released

Pinguy OS an out-of-the-box working operating system for everyone, not just geeks.This OS is for people that have never used Linux before or for people that just want an out-of-the-box working OS without doing all the tweaks and enhancements that everyone seems to do when installing a fresh copy of Ubuntu or other Linux based Distro’s. Read Full Story here: http://www.ubuntugeek.com/pinguy-os-11-04-pre-alpha.html ...

March 15, 2011 · 1 min · 61 words · Omid Farhang