Loading...

Category: Tutorials

Hacking a Safe with Bash

Through the years, I have settled on maintaining my sensitive data in
plain-text
files that I then encrypt asymmetrically. Although I take care to harden my
system and encrypt partitions with LUKS wherever possible, I want to secure my
most important data using higher-level tools, thereby lessening dependence on
the underlying system configuration. more>>

Share

Embed Linux in Monitoring and Control Systems

The target vehicle for this project is a vintage intercity transport bus (think
Greyhound) whose instrument panel was sparse and mostly nonfunctional.
The speedometer cable was twisted off some place back in 40 feet of
cable,
and the fuel sensor had sunk long ago. What I wanted was an instrument
panel more in line with modern practice.
more>>

Share

Home Automation with Raspberry Pi

The Raspberry Pi has been very popular among hobbyists and educators
ever since its launch in 2011. The Raspberry Pi is a credit-card-sized
single-board computer with a Broadcom BCM 2835 SoC, 256MB to 512MB of RAM,
USB ports, GPIO pins, Ethernet, HDMI out, camera header and an SD card
slot. more>>

Share

PHP for Non-Developers

After years of making it clear that I’m not a developer in just
about every article I’ve written here at Linux Journal, I do have a
confession to make. I can write the “Hello World” equivalent in almost
every programming language out there. In assembly, it might have been
“1+1”, but my lack of advanced skills should be evident. more>>

Share

Secure Server Deployments in Hostile Territory

Would you change what you said on the phone, if you knew someone malicious was listening?
Whether or not you view the NSA as malicious, I imagine that after reading the NSA coverage on
Linux Journal, some of you found yourselves modifying your behavior. The same thing
happened to me when I started deploying servers into a public cloud (EC2 in my case).
more>>

Share

Django Templates

In my last article (February 2015), I explained how to create a simple
Django project (“atfproject”) and
inside that, create a simple application (atfapp). The
application worked in that if you went to the URL
http://localhost:8000/hello/Reuven,
you got the text “hello, Reuven”.
more>>

Share

Dr Hjkl on the Command Line

The first time I used vi was in a college programming course. It was the
default editor on the computer lab’s UNIX systems we used to compile our
assignments. I remember when our professor first introduced vi and
explained that you used the hjkl keys to move your cursor around instead of
the arrow keys. more>>

Share

It’s Easier to Ask Forgiveness…

…than to understand Linux permissions! Honestly though, that’s
not really true. Linux permissions are simple and elegant, and once you
understand them, they’re easy to work with. Octal notation gets a little funky,
but even that makes sense once you understand why it exists.


Users and Groups:

more>>

Share