My little newsletter is already one year old; they grow up so fast.
Note from Mikey: Sorry for the lag in the issue, I've been moving!
linux@payload:>
What sysadmins need to know about using Bash
”The main thing you need to know is that Bash is the command-line interpreter on most modern Linux machines. You have other options, but on Red Hat Enterprise Linux, Bash is the default. ~ It has a pretty extensive scripting language associated with it called, well, Bash.”How to access the Linux terminal
”After all of the hard work figuring out how to install things, I was faced with that black terminal with a simple login: Prompt.”Traceroute vs. tracepath: What's the difference?
”Learn the differences between these two important network troubleshooting commands and when you should use traceroute or tracepath. ~ Whether packets can travel from the local system to a remote node. ~ The traceroute command has been around for a very long time, and it's a powerful tool. However, the tracepath utility receives a lot of attention.”How Linux rescues slow computers (and the planet)
”I am ecstatic that they asked. This gives me a great opportunity to help them learn about technology while being a part of their lives. ~ What happens to old computers is a big part of this discussion.”3 open source tools for people with learning difficulties
“The ability to customize applications is one of the great strengths of open source.”
Linux is for EVERYONE. —MT
How to Configure Static IP Address in Ubuntu 22.04 LTS
”It is recommended to have a static IP address on a linux system as it will be persistent across the reboot. In Ubuntu 22.04 LTS desktop, networking is controlled and managed by Network Manager. ~ To configure static IP address, choose Manual and specify the IP details like IP address, netmask, gateway and dns ip. To make above IP address assigned to interface, we must disable and enable the interface.”10 Things to Do After Installing Ubuntu 22.04 [With Bonus Tip]
”I am sure you are excited to experience the brand new Ubuntu 22.04 LTS and its shiny new features. ~ We give you 10 pointers that you can do after installing Ubuntu 22.04 LTS. I hope it helps.”Ubuntu 22.04 vs Ubuntu 20.04 - What's the difference?
”A list of 10 significant feature differences between Ubuntu 20.04 and Ubuntu 22.04 LTS for folks transitioning from LTS to LTS. ~ The primary aspect is there are significant and structural changes between these two LTS versions which is somewhat rare in terms of LTS releases.”How to Install VirtualBox in Ubuntu 22.04 LTS (Jammy Jellyfish)
“VirtualBox is a free and open-source virtualization tool for desktop and servers. It allows the users to run multiple virtual machines of different operating system at the same time. It is a type 2 hypervisor for x86 virtualization.”
My guide to using the Git push command safely
”Understand the usage and impact of this popular Git command on your project, learn new safer alternatives, and grasp the skills of restoring a broken branch.”
security@payload:>
Iranian Hackers Exploiting VMware RCE Bug to Deploy 'Core Impact' Backdoor
”An Iranian-linked threat actor known as Rocket Kitten has been observed actively exploiting a recently patched VMware vulnerability to gain initial access and deploy the Core Impact penetration testing tool on vulnerable systems. ~ 9.8), the critical issue concerns a case of remote code execution vulnerability affecting VMware Workspace ONE Access and Identity Manager.”North Korean Hackers Target Journalists with GOLDBACKDOOR Malware
”A state-backed threat actor with ties to the Democratic People's Republic of Korea has been attributed to a spear-phishing campaign targeting journalists covering the country with the ultimate goal of deploying a backdoor on infected Windows systems. ~ "Compromising a journalist can provide access to highly-sensitive information and enable additional attacks against their sources." ~ The threat actor has a track record of targeting the Republic of Korea with a noted focus on government officials, non-governmental organizations, academics, journalists, and North Korean defectors. ~ Stairwell's investigation into the campaign comes weeks after NK News disclosed that the lure messages were sent from a personal email address belonging to a former South Korean intelligence official, ultimately leading to the deployment of the backdoor in a multi-stage infection process to evade detection.”60% of BYOD companies face serious security risks
”IT teams quickly realized that managing BYOD required specialized skills and additional staffing, while HR leaders found that employees increasingly expected a monthly stipend to compensate for the use of their personal devices for work. More than a decade on smartphones are more central to employee productivity than ever before. ~ These are the questions Samsung sought to answer in a study which surveyed 500 U.S. executives and 1,000 employees at small- and mid-sized businesses to better understand how they approach mobile enablement today, what it costs them and what benefits they accrue.”OpenSSH Suffered a "Near Miss" But is Now Post-Quantum
"Fix an integer overflow in the user authentication path that, in conjunction with other logic errors, could have yielded unauthenticated access under difficult to exploit conditions. This situation is not exploitable because of independent checks in the privilege separation monitor.”Lapsus$ Hackers Stole T-Mobile's Source Code and Systems Data
“Lapsus$ is a notorious group of teen hackers that mainly hunts for the source code of high-profile and large tech firms. ~ In its latest breach against the Lapsus$ group reportedly downloaded over 30,000 source code repositories of the carrier in March 2022.”
cryptocurrency@payload:>
Best Crypto Coins to Stake And Where to Stake Them
”In simple words, you can think of crypto staking as a fixed deposit plan. Validators are treated as high-priority users who share the responsibility of securing the network and making it faster. Every network has its own minimum staking requirements that you must comply to become a staker or a validator node for that particular network. ~ Alternatively you need only 2000 AVAX coins to become a validator for Avalanche. On top of that you'll also help in enhancing the security of the network. Even though crypto-staking can offer great rewards, it does not come without its fair share of risks. ~ Crypto is a highly volatile form of currency, which means that its value keeps on changing every moment. ~ If the value of a cryptocurrency falls more than the interest it yields, you will suffer a loss.”Bored Ape Yacht Club NFTs stolen in Instagram phishing attack
”The phishing attack coincided with the one-year anniversary of BAYC's launch, leading many users to believe that the link was authentic. ~ Crypto enthusiasts who connected their MetaMask wallets to the scam website were subsequently drained of their Ape NFTs. It appears that the attack was planned to coincide with the one-year anniversary of the launch of the BAYC collection, thus increasing the "perceived credibility" of the phishing link. ~ Based on data from CoinGecko, the floor price of each BAYC NFT is around 139 Ether, or $400,726. Thus, if the reports are authentic, more than $40 million worth of assets have been lost in the attack. ~ The collection's supply is fixed at 10,000 NFTs. More than 38,748 ETH worth of Apes were traded on OpenSea in the past 30 days.”AMC Theatres mobile app accepts Dogecoin, Shiba Inu and more
”AMC Theatre CEO Adam Aron disclosed that the iOS and Android mobile applications accept crypto payments via integration with BitPay, a Bitcoin payment service provider.”Coinbase announces beta of NFT marketplace with social engagement
”Crypto exchange Coinbase's nonfungible token marketplace has moved into beta more than six months after the company announced it planned to open a waitlist for the site. ~ "While it is true that buying and selling NFTs is a big part of the ecosystem today, what we have learned by talking to many customers and creators is that there is more to it than just buying and selling". ~ Coinbase NFT will allow users to follow profiles of creators and others, comment on artwork and monitor a personalized feed to discover new NFTs based on engagement and purchases.”Blockchain Tech Is Key to Combating Climate Change, Report Says
”Blockchain technology will play a key role in combating climate change by managing clean energy solutions and enabling enhanced automation.”