Software

What is the first thing to know about software with Linux?

Well, quite simply, software with Linux derives from either command prompt or more typically and widely used, software that you point and click with in a GUI (Graphical User Interface) format.

If you are new to Linux, moving from Windows or macOS or simply don't know what a command prompt is - you will want to use the Graphical User Interface running either GNOME or KDE.

  • Posted on
    Featured Image
    In the world of command-line interface (CLI) tools, Vim stands out as a highly efficient text editor that offers powerful functionality. Born from the lineage of Vi, Vim, which stands for Vi IMproved, extends its predecessor with added features while focusing on speed and efficiency. It thrives in Linux environments and is favored by many developers and system administrators for its robustness and minimal GUI, allowing them to edit files directly from the terminal. Vim is a highly configurable text editor built to enable efficient text editing. It is an improved version of the vi editor distributed with most UNIX systems.
  • Posted on
    Featured Image
    In the realm of configuration management and development, YAML has become increasingly popular due to its simplicity and readability. However, dealing with YAML files can sometimes be cumbersome, especially from the command line. This is where yq comes into play, a lightweight and portable command-line YAML processor which is inspired by jq - the JSON processor. yq is a command-line tool that allows you to read, write, and manipulate YAML files easily. It comes in handy for extracting data, manipulating structures, converting formats, and more—all directly from the terminal or in scripts. Why Use yq? Simplicity: yq uses a succinct syntax which is easy to write and understand.
  • Posted on
    Featured Image
    In the vast realm of IT and software development, working with JSON (JavaScript Object Notation) has become commonplace due to its simplicity and ease of use as a data interchange format. Whether you're a system administrator, a DevOps engineer, or a developer, chances are you frequently need to parse, analyze, or manipulate JSON data. One of the most powerful tools for handling JSON in the Linux environment is jq. This lightweight and flexible command-line JSON processor allows you to slice, filter, map, and transform structured data with the same ease as sed, awk, grep, and friends let you play with text.
  • Posted on
    Featured Image
    When it comes to searching for files in Linux, the find command is indeed powerful and flexible but can be intricate for beginners, and sometimes slow with its vast range of options and expressions. Here, we introduce fd, a simple, fast, and user-friendly alternative that enhances file searching on Unix-like systems, leveraging modern Rust-based implementations. Fast performance: It leverages multi-threaded operations to expedite the search process. Simple syntax: The syntax is more straightforward and easier to remember, focusing on usability. Ignores hidden directories and files by default: Streamlines results by ignoring entries that you often don't need.
  • Posted on
    Featured Image
    If you spend a lot of time navigating through code, configuration files, or log files in the Linux terminal, you're likely familiar with the classic cat utility, which reads files sequentially, writing them to the standard output. But what if you could have all that functionality with added syntax highlighting, git integration, and more? Enter bat—a powerful cat clone that not only mimics the traditional behavior of cat but enhances it significantly. The bat utility breathes new life into the file preview process by adding syntax highlighting for a multitude of programming and markup languages.
  • Posted on
    Featured Image
    When it comes to searching text on your computer, speed matters - whether you're a developer sifting through source code, an analyst searching logs, or simply someone who needs to find a piece of information buried in numerous files. Here's where ag, also known as The Silver Searcher, shines as a go-to tool. Modeled after ack, another powerful search tool, ag substantially speeds up the search process by leveraging multiple CPU cores and ignoring files that don't matter to you (thanks to integration with .gitignore). In this blog post, we'll explore ag more deeply, underscoring its advantages, and provide detailed installation instructions for various Linux distributions.
  • Posted on
    Featured Image
    In the vast toolbox of command-line utilities for Linux, searching through files quickly and efficiently is a task often encountered by developers and system administrators. Traditionally, tools like grep have been used to handle this job, but a newer tool named ripgrep, often abbreviated as rg, has gained popularity for its speed and usability, particularly when searching large volumes of data or complex directory structures. Today, I will guide you through what makes ripgrep standout, and how you can install it on your Linux system using various package managers like apt, dnf, and zypper. Ripgrep is a line-oriented search tool that recursively searches your current directory for a regex pattern.
  • Posted on
    Featured Image
    If you're traversing the Linux command line, manipulating files, or scripts, and often find yourself struggling to remember the exact name of a file, fzf, the fuzzy file finder, might just be the tool you've been missing. This powerful command-line utility can boost your productivity by allowing speedy and efficient file searches, leveraging a fuzzy finding technique that simplifies the search process across complex directory structures. fzf is a general-purpose command-line fuzzy finder developed in Go. It's not just confined to file searching but can be used to find anything, such as commands in your history, git commits, or directories. It integrates seamlessly with Vim and can be used inside your shell's command pipeline.
  • Posted on
    Featured Image
    In the diverse toolkit of a developer, especially those who favor the command line, tig stands out as a particularly useful gem. tig is a text-based user interface (TUI) for Git. It doesn't just serve as a Git repository browser but also provides tools to navigate through commits, branches, and more, thus simplifying the daily workflow for developers who are comfortable with terminal-based operations. Tig allows developers to perform Git operations in a simple and more intuitive way directly in their terminal. It provides a visual representation of commit history, diffs, and allows for quick manipulations of Git repositories without the need to input multiple complex Git commands.
  • Posted on
    Featured Image
    In the world of software development, keeping track of changes in your project files and coordinating work among multiple developers can be challenging without the right tools. One essential tool that has revolutionized version control is Git. It is a distributed version control system popular among individual developers and large teams for its robustness, flexibility, and efficiency. Whether you are a beginner looking to start a new project or a seasoned developer working in a collaborative environment, understanding how to set up and use Git on Linux is crucial.
  • Posted on
    Featured Image
    In the world of Linux, ensuring the security of your system is paramount. firewalld is one of the most popular firewall management tools, offering a dynamic, flexible way to manage your system's firewall settings without the need for restarting the firewall service after tweaks or changes. This blog will introduce you to firewalld, guide you through its benefits, and provide detailed installation instructions across different Linux distributions using various package managers. firewalld is a firewall management solution that provides a configurable and manageable way to protect your Linux system from unauthorized access.
  • Posted on
    Featured Image
    In the world of cybersecurity, ensuring that your SSL/TLS configurations are solid and secure is paramount. One of the most powerful tools available for this purpose is testssl.sh, a free command-line tool designed to perform comprehensive tests on TLS/SSL encryption capabilities of any server. In this blog, we'll explore how testssl.sh works, discuss its benefits, and walk you through its installation across various Linux distributions using different package managers. testssl.sh is an open-source project dedicated to performing detailed analyses of SSL/TLS configurations on web servers, email servers, or any servers using SSL/TLS encryption.
  • Posted on
    Featured Image
    With cyber threats on the rise, ensuring that your network's security configurations such as SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are up to the mark is crucial. This is where sslscan, a powerful command-line tool, becomes an essential asset. sslscan tests SSL/TLS enabled services to discover supported cipher suites. In this blog, we explore what sslscan is, how to install it, and how to use it effectively. sslscan queries SSL/TLS services, such as HTTPS, to know what cipher suites are supported and provides other related details like certificate information. It is particularly useful for system administrators and security professionals for quick checks or automated tasks regarding SSL/TLS configuration assessments.
  • Posted on
    Featured Image
    In the world of network troubleshooting and analysis, the ability to capture and inspect data packets is indispensable. This is where TCPFlow comes into play, a powerful tool that simplifies the process of monitoring TCP traffic between hosts. Unlike other packet analysis tools like Wireshark, TCPFlow focuses specifically on TCP streams, making it ideal for users who are interested in analyzing TCP traffic without the overhead of capturing all network traffic. TCPFlow is an open-source program that captures data transmitted as part of TCP connections (flows), and then saves that data to files for analysis. It reconstructs the actual data streams and can capture non-standard port traffic that might be overlooked by other packet sniffers.
  • Posted on
    Featured Image
    In the realm of network administration and security, tools that allow for detailed inspection, analysis, and simulation of network traffic are crucial. One such powerful tool is hping3, a command-line oriented TCP/IP packet assembler/analyzer. Whether you're performing network security auditing, penetration testing, or simply troubleshooting network protocols, hping3 can be incredibly beneficial due to its versatility in packet generation and response analysis. hping3 is a network tool able to send custom TCP/IP packets and to display target replies like ping does with ICMP replies. hping3 can handle fragmentation, arbitrary packet body and size, and can be used to transfer files encapsulated under supported protocols.
  • Posted on
    Featured Image
    In the world of network security and administration, scanning your network is a critical first step in identifying vulnerabilities, mapping out network structures, and ensuring robust network performance. Today, we're diving into one of the most powerful tools available for network scanning: zmap. This lightweight, yet incredibly fast scanner can perform a wide area network scan in under 45 minutes, scanning over 10 million IPs. Here’s what you need to know about zmap, including detailed installation instructions for various Linux distributions. zmap is an open-source network scanner that allows researchers to scan the Internet networks in a fast and comprehensive manner.
  • Posted on
    Featured Image
    When it comes to managing DNS servers, few tools offer the functionality and dependability as BIND (Berkeley Internet Name Domain) does. BIND is one of the most widely used DNS software on the Internet. For Linux users, leveraging BIND tools can significantly simplify DNS management tasks. In this article, we're going to delve into what BIND tools offer and how you can install them across different Linux distributions using various package managers. BIND is a versatile, open-source DNS software developed by the Internet Systems Consortium (ISC). It allows users to implement DNS servers with the capability to perform as a name server for your specific domain.
  • Posted on
    Featured Image
    In the current landscape of internet security, safeguarding your DNS traffic is crucial. DNS, or Domain Name System, resolves the human-readable website names into machine-readable IP addresses. However, traditional DNS queries are unencrypted, exposing them to vulnerabilities such as eavesdropping, man-in-the-middle attacks, and spoofing. To enhance privacy and security, encrypting your DNS traffic is advisable. One of the tools that enable DNS traffic encryption is dnscrypt-proxy. dnscrypt-proxy is a flexible DNS proxy that supports advanced DNS encryption protocols like DNSCrypt V2 and DNS-over-HTTPS (DoH). By encrypting DNS requests, dnscrypt-proxy boosts your online privacy and helps to prevent DNS-based attacks.
  • Posted on
    Featured Image
    In the realm of network administration, discovering all the devices connected to a network is crucial for management and security tasks. Netdiscover is an active/passive address reconnaissance tool, highly useful for network administrators looking to identify devices on a local network. In this blog post, we will dive into what Netdiscover is, why it's beneficial, and how to install and use it across different Linux distributions. Netdiscover is an open-source network tool used for detecting network devices on local ethernet networks. It operates primarily in two modes: passive and active scanning mode.
  • Posted on
    Featured Image
    In a world teeming with data, understanding your network's behavior is crucial. Whether you're a system administrator, a cybersecurity enthusiast, or just a curious geek, knowing how data flows through your network can be both insightful and fun. Darkstat is one of those tools that packs a powerful punch in monitoring network traffic. It's a lightweight, web-based network traffic analyzer that captures network traffic, calculates statistics, and provides useful graphical information about the data it monitors. In this article, I will guide you through the detailed steps to install and use Darkstat on a Linux system.
  • Posted on
    Featured Image
    In the realm of network security and monitoring, understanding HTTP traffic is crucial for system administrators and security professionals. httpry stands out as a specialized packet sniffing tool designed specifically to capture and analyze HTTP traffic. It parses HTTP packets in real-time and displays them in a human-readable format. This makes httpry incredibly useful for debugging web applications, monitoring network usage, or even spotting suspicious activities. In this blog post, we’ll walk through what httpry is, how to install it on various Linux distributions, and some basic usage examples. Httpry is a command-line tool written in C, which utilizes the pcap library to capture network traffic.
  • Posted on
    Featured Image
    In the realm of network management, having insight into the bandwidth usage of your network can be vital, especially for system administrators and network engineers. This is where nload, a command-line based tool, shines by providing a simple yet effective way to visualize network traffic in real time. In this blog post, we'll dive into what nload can do and how you can install and use it across various Linux distributions. Nload is a network monitoring tool designed for the Linux command line. It allows users to monitor incoming and outgoing traffic separately. It also provides detailed information on the total amount of data transferred and the min/max network usage.
  • Posted on
    Featured Image
    Network management is an essential skill for any system administrator, and when it comes to Linux, tools like bridge-utils become invaluable. Frequently used to facilitate the virtual networking setups, particularly involving virtual machines and containers, bridge-utils provides command-line utilities to create and manage network bridges on Linux. In this article, we'll dive into what a network bridge is, why it’s useful, how you can install bridge-utils using different package managers like apt, dnf, and zypper, and some basic commands to get you started. Before we jump into the installation and usage of bridge-utils, let's clarify what a network bridge is.
  • Posted on
    Featured Image
    When it comes to managing network interfaces in Linux, the traditional ifconfig tool has seen its day. Modern Linux distributions have largely replaced it with the more powerful ip tool, which is part of the iproute2 package. The ip command offers a comprehensive framework for managing network configurations, allowing you to configure network interfaces, set routing tables, manage ARP tables, and much more. In this blog post, we'll look at what makes the ip tool so essential, how to install it, and some basic usage examples to get you started. The ifconfig tool, part of the net-tools suite, has been the traditional tool for network interface management.
  • Posted on
    Featured Image
    In the realm of network troubleshooting and security monitoring, a variety of tools are necessary to diagnose connectivity issues, track network performance, and ensure security protocols are enforced. Most are familiar with the traditional ping command, which tests connectivity between two hosts on an IP network. However, there's a less commonly used yet equally critical tool for network administrators: arping. arping is a computer software tool that performs a similar function to ping but operates at the network layer using ARP (Address Resolution Protocol) rather than ICMP (Internet Control Message Protocol).