• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Category: Unix

Minimal Linux x86 Bind Shell Shellcode: Building a 44-Byte Payload
Unix

Minimal Linux x86 Bind Shell Shellcode: Building a 44-Byte Payload

15 hours ago01/11/2025Oleg Boytsev3060
You probably know that almost every exploit includes so‑called shellcode that runs when the exploit triggers. It might seem like writing shellcode is only for the chosen few, but it’s not as daunting as it looks. In…
CONTINUE READING 🡒
How to Troubleshoot and Fix Bluetooth Headphone Issues on Linux
Unix

How to Troubleshoot and Fix Bluetooth Headphone Issues on Linux

1 day ago01/11/2025Aleksei Zemond Pankratov3220
Getting sound working on Linux has never been straightforward, and adding wireless headphones makes it a bit more complicated. That said, on modern distributions you can usually fix it by installing a few extra packages.
CONTINUE READING 🡒
Hacking a Xiaomi Security Camera: Full Control and iOS/HomeKit Integration
Unix

Hacking a Xiaomi Security Camera: Full Control and iOS/HomeKit Integration

5 days ago18/10/2025Vitaly Yurkin3780
Chinese brand Xiaomi is known not only for its smartphones but also for an ever-growing lineup of budget gadgets. The catch: they often only work with Xiaomi’s own apps and hubs. In this article, I’ll show you…
CONTINUE READING 🡒
Tuning a Minimalist Linux Desktop for Power Users: i3 and dmenu tweaks, pass password manager, surf browser, slock lock screen, and a hotkey translator
Unix

Tuning a Minimalist Linux Desktop for Power Users: i3 and…

3 weeks ago14/09/2025Eugene Zobnin4250
Recently we put together a basic geek desktop around i3, but we left a lot of smaller, less obvious pieces out of the write-up. Today we’ll finish polishing the setup: teach dmenu to control brightness, volume, and…
CONTINUE READING 🡒
Per-App VPN on Linux: Tunnel Individual Application Traffic with Network Namespaces
Unix

Per-App VPN on Linux: Tunnel Individual Application Traffic with Network…

3 weeks ago14/09/2025eakj5260
A VPN is a great tool for boosting your privacy and security. But staying on a VPN all the time can be inconvenient: maybe you want to access your online banking from your real IP address while…
CONTINUE READING 🡒
Optimizing Linux Power Management for Maximum Laptop Battery Life
Unix

Optimizing Linux Power Management for Maximum Laptop Battery Life

3 weeks ago14/09/2025Ilya Ostapenko6080
Be honest: how many times have you felt like spitting in the face of the marketer who dreams up those ridiculous “10–12 hours of battery life” claims? Six or seven is closer to reality—and even then only…
CONTINUE READING 🡒
Monitor and Control: How to Audit and Track Everything on Your Linux System
Unix

Monitor and Control: How to Audit and Track Everything on…

4 weeks ago14/09/2025Nikolai enchantner Markov4330
Are you sure you’re on top of everything happening on your system? Maybe you’re already using a monitoring stack like Prometheus or Zabbix, but do you know how to generate your own detailed reports on system and…
CONTINUE READING 🡒
Linux Hardening: Essential Tools for Comprehensive Security Auditing
Unix

Linux Hardening: Essential Tools for Comprehensive Security Auditing

1 month ago13/09/2025Ivan Piskunov3980
In this article, we’ll explore the key utilities for Linux hardening—tools for assessing a Linux system’s security posture and validating configurations from an information security perspective. We’ll not only review the tools but also provide practical examples…
CONTINUE READING 🡒
How to Build an Unconventional Raspberry Pi Media Center: A DIY Recipe
Unix

How to Build an Unconventional Raspberry Pi Media Center: A…

1 month ago13/09/2025Eugene Zobnin2600
In the six years since the Raspberry Pi appeared, countless guides have shown how to turn it into a home media center. The problem is, the classic media-center setup on a Pi is so underwhelming it loses…
CONTINUE READING 🡒
Decoding Ping, Traceroute, and WHOIS Output for Effective Network Troubleshooting
Unix

Decoding Ping, Traceroute, and WHOIS Output for Effective Network Troubleshooting

2 months ago23/08/2025Daniil Baturin3250
Ping, traceroute, and whois are among the first tools new admins learn. Many people who aren’t network specialists stop there—and that’s a mistake. With the standard toolset you can pull far more information about a problem than…
CONTINUE READING 🡒
Hardware Over the Network: Passthrough USB Devices, GPU, Sound Card, and Disks to a Remote Machine
Unix

Hardware Over the Network: Passthrough USB Devices, GPU, Sound Card,…

2 months ago23/08/2025Ilya Ostapenko1630
In one of our earlier articles, we explored ways to expose all kinds of resources as files and directories—WebDAV, BitTorrent, SSH, and even GPU memory. But what if we want access not to a remote or local…
CONTINUE READING 🡒
Vulnerability Scanning with Kali Linux: Penetration Testing Essentials
Unix

Vulnerability Scanning with Kali Linux: Penetration Testing Essentials

2 months ago23/08/2025Piter Publishing House2330
Vulnerability scanning is the process of identifying and analyzing critical security weaknesses in a target environment. It’s sometimes referred to as a vulnerability assessment. Vulnerability scanning is a core function of a vulnerability management program focused on…
CONTINUE READING 🡒
Corosync and Pacemaker: Best Practices for Deploying a High‑Availability (HA) Cluster
Unix

Corosync and Pacemaker: Best Practices for Deploying a High‑Availability (HA)…

2 months ago23/08/2025Ivan Ryzhevtsev4860
Getting a service to handle heavy traffic is a challenge every sysadmin runs into sooner or later. It’s best to put high-availability mechanisms in place ahead of time—before critical nodes start failing. In this article, I’ll cover…
CONTINUE READING 🡒
13 Essential Sysadmin Utilities Every System Administrator Should Know
Unix

13 Essential Sysadmin Utilities Every System Administrator Should Know

2 months ago23/08/2025Eugene Zobnin1850
A well-stocked toolbox is what sets a seasoned pro apart from a newbie. And in Linux administration, that toolbox is about as critical as it gets. In this article, we’re not going to cover things like Nagios,…
CONTINUE READING 🡒
Set Up a Private VPN Server for Friends with Telegram Payments
Unix

Set Up a Private VPN Server for Friends with Telegram…

3 months ago19/08/2025driver0black2050
In this article, I’ll show you not only how to build your own WireGuard-based VPN service, but also how to configure it so all your friends can use it. And if you want, they can even chip…
CONTINUE READING 🡒
Creating a Bootable USB Drive with Arch Linux Live Image
Unix

Creating a Bootable USB Drive with Arch Linux Live Image

3 months ago06/08/2025ksandr8570
Today, we will create a live USB drive with an Arch Linux installation image. By "live," I mean it will allow you to install and remove programs, modify any files, and save changes while in use. I've…
CONTINUE READING 🡒
Exploring firewalld: A Simple and Powerful Firewall for Linux to Replace iptables
Unix

Exploring firewalld: A Simple and Powerful Firewall for Linux to…

3 months ago06/08/2025Martin Prankevich1870
There are numerous articles dedicated to configuring a firewall using iptables in Linux, and given the topic's popularity, many more are likely to be written. While basic configurations are relatively straightforward, things get complicated with complex networks…
CONTINUE READING 🡒
10 Compelling Reasons to Choose Arch Linux: Embracing Minimalism with Maximum Power
Unix

10 Compelling Reasons to Choose Arch Linux: Embracing Minimalism with…

06.08.202503/08/2025Eugene Zobnin2030
We felt that writing about installing and configuring Arch Linux was a bit passé and redundant. So, we decided to take a different approach and discuss why this system exists in the first place and why millions…
CONTINUE READING 🡒
Manjaro vs Arch Linux: Why Stick with Arch for Advanced Users?
Unix

Manjaro vs Arch Linux: Why Stick with Arch for Advanced…

05.08.202503/08/2025Ilya Ostapenko3740
The world of Linux desktop systems is incredibly diverse. As of now, Distrowatch.com lists 288 different distributions, each with its own philosophy and area of application. Throughout the history of the rankings, hundreds of distributions have come…
CONTINUE READING 🡒
Hacker’s Toolkit: Essential Tools for Windows and Linux
Unix

Hacker’s Toolkit: Essential Tools for Windows and Linux

03.08.202502/08/2025Polski Kot2130
Live and learn, always collecting useful tools along the way! Following this principle, I've gathered an extensive collection of utilities, and I'd like to share the best with you. Perhaps you'll find something that will be helpful…
CONTINUE READING 🡒
1 2 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com