Another, more recent, listing: https://ligurio.github.io/awesome-ttygames/
tl;dr:
sudo apt install tor
torify curl ...
WebVM is a server-less virtual Linux environment running fully client-side in HTML5/WebAssembly in your browser.
It is available as a Dockerfile
Over a period of over two years, an attacker using the name “Jia Tan” worked as a diligent, effective contributor to the xz compression library, eventually being granted commit access and maintainership. Using that access, they installed a very subtle, carefully hidden backdoor into liblzma, a part of xz that also happens to be a dependency of OpenSSH sshd on Debian, Ubuntu, and Fedora, and other systemd-based Linux systems that patched sshd to link libsystemd.
That backdoor watches for the attacker sending hidden commands at the start of an SSH session, giving the attacker the ability to run an arbitrary command on the target system without logging in: unauthenticated, targeted remote code execution.The attack was publicly disclosed on March 29, 2024 and appears to be the first serious known supply chain attack on widely used open source software. It marks a watershed moment in open source supply chain security, for better or worse.
This post is a detailed timeline that I have constructed of the social engineering aspect of the attack, which appears to date back to late 2021.
In this post, we will explore how Unix pipes are implemented in Linux by iteratively optimizing a test program that writes and reads data through a pipe.1
We will begin with a simple program with a throughput of around 3.5GiB/s, and improve its performance twentyfold.
This year, researcher David Buchanan tried to implement parallel decoding using the iDOT information. During development, he made a simple programming mistake and ended up making a wonderful discovery. He could create a PNG file with platform-dependent rendering. It looked one way on Windows, Linux, Firefox, and Chrome, and a different way on a Mac with default Apple applications, like the Safari web browser. (He found that Apple had implemented the same bug!) Buchanan provided two sample pictures (Hello World and computers) to demonstrate this per-platform rendering. It didn't take long for other people to use his code and generate other examples. Many of these images were uploaded to FotoForensics:
Nice step by step guide to identify on which layer do you have an issue : Physical, Data Link, Network/Internet or Transport?
This blog post explains how computers running the Linux kernel receive packets, as well as how to monitor and tune each component of the networking stack as packets flow from the network toward userland programs.
Script to install Datalogics PDF Checker CLI on a Linux system:
curl https://raw.githubusercontent.com/Lucas-C/dotfiles_and_notes/master/bin/install-pdfchecker.sh | bash
PDF_Checker/pdfchecker --profile PDF_Checker/CheckerProfiles/everything.json --input $pdf
Je crois que j'envisage d'écrire un article sur ce sujet depuis que j'ai créé ce blog ! J'ai retrouvé ces notes datant d'au moins 5 ans, déposées au fin fond d'un fichier texte :
Dans tous ces jeux, un des plaisirs principaux provient de la découverte, à deux ou plus, des règles …
The USE Method provides a strategy for performing a complete check of system health, identifying common bottlenecks and errors. For each system resource, metrics for utilization, saturation and errors are identified and checked. Any issues discovered are then investigated using further strategies.
This is an example USE-based metric list for Linux operating systems (eg, Ubuntu, CentOS, Fedora). This is primarily intended for system administrators of the physical systems, who are using command line tools. Some of these metrics can be found in remote monitoring tools.
Linux load averages are "system load averages" that show the running thread (task) demand on the system as an average number of running plus waiting threads.
Le Bottin des Jeux Linux est votre base de données libre en français et en anglais dans laquelle vous trouverez 3835 jeux Linux et 847 outils (moteurs, émulateurs, …), avec des liens utiles, de l’aide (pour installer certains jeux & outils), des tests et des vidéos.
Deux versions sont disponibles (1 en ligne + 1 hors ligne). Cette base de données est la vôtre, elle est libre et open source (licence CC-BY).