Interesting Linux oddities Linux has had quite a few odd programs and oddities released for it. One was a process management system that used a modified copy of Xdoom, a Doom source port, to manage processes. The utility used the Doom2 game files and there were Imps in the main outside courtyard. Shooting them and …

The title bars in the Gnome Shell desktop environment by default are much too thick. This simple code sample will make them thinner. Just create this file. ~/.config/gtk-3.0/gtk.css. Then put this code into it. headerbar { min-height: 0px; padding-top: 2px; padding-bottom: 2px; padding-right: 2px; padding-left: 2px; }   headerbar entry, headerbar spinbutton, headerbar button, headerbar …

I just installed the Linux version of the SGI desktop on my Fedora 25 Linux machine. This was not too hard either. Download a copy of the installation script from here: http://www.maxxinteractive.com/site/?page_id=51. Run the script as root to download and install the MaXX desktop tarball. [[email protected] Downloads]# sh MaXX-Indy-1.0.0-Installer.sh   >>> Downloading MaXX Interactive Desktop …

Very useful Linux commands Another way to get the uptime of the system. awk ‘{printf("Uptime: %d:%02d days, %02d minutes, %02d seconds.\n",($1/60/60/24),($1/60/60%24),($1/60%60),($1%60))}’ /proc/uptimeawk ‘{printf("Uptime: %d:%02d days, %02d minutes, %02d seconds.\n",($1/60/60/24),($1/60/60%24),($1/60%60),($1%60))}’ /proc/uptime Find the actual device name of the drive that contains your root partition. ip-172-31-20-16:~> findmnt -n -o SOURCE / /dev/xvda1ip-172-31-20-16:~> findmnt -n -o SOURCE / …

The GRUB configuration on Fedora is editable with the VIM text editor, but what if the user wishes to edit it with a graphical program? Well you can. The grub-customizer utility allows a superuser to edit the GRUB file with a GUI window. Install it like this. [[email protected] Documents]# dnf install grub-customizer-5.0.6-1.fc25.x86_64[[email protected] Documents]# dnf install …

This is the execution flow for the Wannacry malware. This ransomware can encrypt all of your files and then demand payment in bitcoins to decrypt the files. The virus was recently remade into a 2.0 with no killswitch. But the older version is this one that had a killswitch that contacted a website that did …

Funny and cool Linux tips 1337 or Leet in the UNIX time. -01:44:57– [email protected] [~]$ date +%s 1337096699-01:44:57– [email protected] [~]$ date +%s 1337096699 The missing days in 1752. I have mentioned this before, but it is worth mentioning again. -01:45:31– [email protected] [~]$ cal 9 1752 September 1752 Su Mo Tu We Th Fr Sa 1 …

Add a user to the sudoers file on Linux easily If you need to add your user on a Linux system to the /etc/sudoers file, this is how to do it properly. I am adding a new UNIX user to my system. This user will have sudo access. [email protected]:~$ sudo adduser adler Adding user `adler’ …