Sudo vulnerabilities Released – (CVE-2021-3156)
A vulnerability in sudo, a critical and ubiquitous open-source utility used in Linux and Unix operating systems, could allow unprivileged local users to gain root …
Knowledge pool for Information Technologies
A vulnerability in sudo, a critical and ubiquitous open-source utility used in Linux and Unix operating systems, could allow unprivileged local users to gain root …
The touch command changes the timestamp of the existing file or folder, creates a new blank file if the file or folder does not exist. …
We will show you how to shorten the long commands we use constantly in the Linux command line using an alias. Although we show it …
In Linux systems, “chmod” command is used to determine the access rights of users to files. It allows us to change the access permissions of …
We would like to point out that if you have a Linux system you need to take care of and want to sleep comfortably, you …
While performing your operations with commands in the terminal, you wanted to make corrections in a file (resolv.conf etc.) with the nano editor. In this …
You should be aware that the deletion used in Linux and other operating systems does not actually delete your files. We will explain the detailed …
Most Linux users regularly install security updates and use the latest version. As far as we know, they are sensitive and careful. But this sensitivity …
If you have an Operating System that uses Ubuntu or apt package manager, you must have used apt-get update and similar commands before. We will …
It is the advanced version of the ping command. Only ICMP is supported in ping, hping3 also supports protocols such as TCP, UDP, Raw-IP. The …