<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Linux Archives - CVTF Studios.net</title>
	<atom:link href="https://cvtfstudios.net/category/linux/feed/" rel="self" type="application/rss+xml" />
	<link>https://cvtfstudios.net/category/linux/</link>
	<description>Webhosting in the city</description>
	<lastBuildDate>Wed, 30 Jun 2021 10:11:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>What is the best Linux Distributions for Hacking and Penetration Testing in 2016</title>
		<link>https://cvtfstudios.net/best-linux-distributions-hacking-penetration-testing-2016/</link>
					<comments>https://cvtfstudios.net/best-linux-distributions-hacking-penetration-testing-2016/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 02 Aug 2016 21:09:04 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux Security]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Linux Distributions for Hacking and Penetration Testing]]></category>
		<guid isPermaLink="false">http://cvtfstudios.net/?p=3441</guid>

					<description><![CDATA[<p>Last updated August 1, 2016 By Munif Tanjim- https://itsfoss.com Looking for best Linux to learn hacking? Whether you want to pursue a career in Information Security or you are already working as a security professional or if you are just interested in this specific field of knowledge, a decent Linux distro that suits your purpose  [...]</p>
<p>The post <a href="https://cvtfstudios.net/best-linux-distributions-hacking-penetration-testing-2016/">What is the best Linux Distributions for Hacking and Penetration Testing in 2016</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h6><img fetchpriority="high" decoding="async" class="alignnone wp-image-3447" src="https://cvtfstudios.net/wp-content/uploads/2016/08/kali-wp-june-2014_1920x1200_F-1024x640.png" alt="kali-wp-june-2014_1920x1200_F" width="806" height="504" srcset="https://cvtfstudios.net/wp-content/uploads/2016/08/kali-wp-june-2014_1920x1200_F-300x188.png 300w, https://cvtfstudios.net/wp-content/uploads/2016/08/kali-wp-june-2014_1920x1200_F-500x313.png 500w, https://cvtfstudios.net/wp-content/uploads/2016/08/kali-wp-june-2014_1920x1200_F-700x438.png 700w, https://cvtfstudios.net/wp-content/uploads/2016/08/kali-wp-june-2014_1920x1200_F-1024x640.png 1024w, https://cvtfstudios.net/wp-content/uploads/2016/08/kali-wp-june-2014_1920x1200_F.png 1920w" sizes="(max-width: 806px) 100vw, 806px" /></h6>
<h6>Last updated <time class="entry-modified-time" datetime="2016-08-01T20:42:41+00:00">August 1, 2016</time> By <span class="entry-author"><a class="entry-author-link" href="https://itsfoss.com/author/munif/" rel="author"><span class="entry-author-name">Munif Tanjim</span></a></span>&#8211; <a href="https://itsfoss.com/linux-hacking-penetration-testing/?utm_source=newsletter&amp;utm_medium=email&amp;utm_campaign=linux_and_open_source_stories_this_week">https://itsfoss.com</a></h6>
<p>Looking for <strong>best Linux to learn hacking</strong>?</p>
<p>Whether you want to pursue a career in Information Security or you are already working as a security professional or if you are just interested in this specific field of knowledge, a decent Linux distro that suits your purpose is a must.</p>
<p>There are countless Linux distros for various purposes. Some are designed for specific tasks in mind and others are for different interfaces.</p>
<p>We have seen <a href="https://itsfoss.com/weird-ubuntu-based-linux-distributions/" target="_blank" rel="noopener">weird Ubuntu distributions</a> in an older article. But, today we are going to have a look at a list of some of the <em><strong>best Linux distro to learn hacking</strong> and Penetration Testing</em>.</p>
<p>Before we see the best Linux distros for hackers, I would recommend you to check for <a href="https://shop.itsfoss.com/search?utf8=%E2%9C%93&amp;query=hacking+course" target="_blank" rel="noopener">online hacking courses at our ITSFOSS shop</a>.</p>
<h2>Best Linux hacking distros in 2016</h2>
<p>I have basically listed out various Linux distributions focusing on security. These Linux distros provide various tools that are needed for assessing networking security and other similar tasks. List is in no particular order.</p>
<h3><a class="external external_icon" href="https://www.kali.org/" target="_blank" rel="nofollow noopener">Kali Linux</a></h3>
<p>Kali Linux is the most widely known Linux distro for ethical hacking and penetration testing. Kali Linux was developed by Offensive Security taking on the mantle of <a class="external external_icon" href="https://www.backtrack-linux.org/" target="_blank" rel="nofollow noopener">BackTrack</a>.</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fbest-linux-distributions-hacking-penetration-testing-2016%2F&amp;linkname=What%20is%20the%20best%20Linux%20Distributions%20for%20Hacking%20and%20Penetration%20Testing%20in%202016" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fbest-linux-distributions-hacking-penetration-testing-2016%2F&amp;linkname=What%20is%20the%20best%20Linux%20Distributions%20for%20Hacking%20and%20Penetration%20Testing%20in%202016" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fbest-linux-distributions-hacking-penetration-testing-2016%2F&amp;linkname=What%20is%20the%20best%20Linux%20Distributions%20for%20Hacking%20and%20Penetration%20Testing%20in%202016" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fbest-linux-distributions-hacking-penetration-testing-2016%2F&amp;linkname=What%20is%20the%20best%20Linux%20Distributions%20for%20Hacking%20and%20Penetration%20Testing%20in%202016" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fbest-linux-distributions-hacking-penetration-testing-2016%2F&amp;linkname=What%20is%20the%20best%20Linux%20Distributions%20for%20Hacking%20and%20Penetration%20Testing%20in%202016" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fbest-linux-distributions-hacking-penetration-testing-2016%2F&amp;linkname=What%20is%20the%20best%20Linux%20Distributions%20for%20Hacking%20and%20Penetration%20Testing%20in%202016" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fbest-linux-distributions-hacking-penetration-testing-2016%2F&#038;title=What%20is%20the%20best%20Linux%20Distributions%20for%20Hacking%20and%20Penetration%20Testing%20in%202016" data-a2a-url="https://cvtfstudios.net/best-linux-distributions-hacking-penetration-testing-2016/" data-a2a-title="What is the best Linux Distributions for Hacking and Penetration Testing in 2016"></a></p><p>The post <a href="https://cvtfstudios.net/best-linux-distributions-hacking-penetration-testing-2016/">What is the best Linux Distributions for Hacking and Penetration Testing in 2016</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/best-linux-distributions-hacking-penetration-testing-2016/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fortinet SSH Backdoor Found In Firewalls</title>
		<link>https://cvtfstudios.net/3399-2/</link>
					<comments>https://cvtfstudios.net/3399-2/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 21 Apr 2016 12:35:29 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux Security]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Fortinet SSH Backdoor Found In Firewalls]]></category>
		<guid isPermaLink="false">http://cvtfstudios.net/?p=3399</guid>

					<description><![CDATA[<p>    January 14, 2016 So the Fortinet SSH Backdoor, apparently it’s just a management authentication issue. Sorry, what’s that? It looks like a passphrase based admin level access login via SSH to me personally. Which is scary. They are adamantly shouting from rooftops that it was not planted by a 3rd party (NSA? Like  [...]</p>
<p>The post <a href="https://cvtfstudios.net/3399-2/">Fortinet SSH Backdoor Found In Firewalls</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="post-meta"><abbr class="date time published updated" title="2016-01-14T01:55:11+0800"> </abbr></div>
<section class="entry">
<p align="center"><img decoding="async" class="aligncenter" src="https://c2.staticflickr.com/2/1720/24332701546_d394b9b905.jpg" alt="Fortinet SSH Backdoor Found In Firewalls" /></p>
<p>&nbsp;</p>
<p><abbr class="date time published updated" title="2016-01-14T01:55:11+0800">January 14, 2016</abbr></p>
<p>So the Fortinet SSH Backdoor, apparently it’s just a management authentication issue. Sorry, what’s that? It looks like a passphrase based admin level access login via SSH to me personally.</p>
<p>Which is scary.</p>
<p>They are adamantly shouting from rooftops that it was not planted by a 3rd party (<a href="https://www.schneier.com/blog/archives/2015/12/back_door_in_ju.html">NSA? Like Juniper</a>..) or any kind of malicious activity.</p>
<blockquote><p>Enterprise security vendor Fortinet has attempted to explain why its FortiOS firewalls were shipped with hardcoded SSH logins.</p>
<p>It appears Fortinet’s engineers implemented their own method of authentication for logging-into FortiOS-powered devices, and the mechanism ultimately uses a secret passphrase. This code was reverse-engineered by persons unknown, and a Python script to exploit the hole emerged on the Full Disclosure mailing list this week.</p>
<p>Anyone who uses this script against vulnerable firewalls will gain administrator-level command-line access to the equipment. After some outcry on Twitter and beyond, Fortinet responded by saying it has already killed off the dodgy login system.</p>
<p>“This issue was resolved and a patch was made available in July 2014 as part of Fortinet’s commitment to ensuring the quality and integrity of our codebase,” a spokeswoman told El Reg.</p>
<p>“This was not a ‘backdoor’ vulnerability issue but rather a management authentication issue. The issue was identified by our product security team as part of their regular review and testing efforts. After careful analysis and investigation, we were able to verify this issue was not due to any malicious activity by any party, internal or external.”</p>
<p>In a security advisory dated today, Fortinet explained that the issue affects FortiOS versions 4.3.0 to 4.3.16 and 5.0.0 to 5.0.7. This covers FortiOS builds from between November 2012 and July 2014, and it’s certainly possible that some slack IT admins haven’t updated the software since then.</p></blockquote>
<div align="center"></div>
<p>It was actually patched by Fortinet in July 2014, but with edge devices like Firewalls – they don’t often get updated as it usually causes network downtime. So I’d guess there are plenty of firewalls out there very vulnerable to this, which basically gives you full admin access.</p>
<p>You can find the ‘exploit’ script in Python here: <a href="https://seclists.org/fulldisclosure/2016/Jan/26">SSH Backdoor for FortiGate OS Version 4.x up to 5.0.7</a></p>
<blockquote><p>It’s also possible that even if they did update in a timely fashion, their devices could have been breached before the fix was issued.</p>
<p>The login method is used by FortiManager, a tool for controlling any number of Fortinet devices from a central system.</p>
<p>If you are running older code and can’t upgrade, the firewall maker suggests a couple of workarounds. Managers can disable admin access via SSH and use the web interface instead, or the console browser applet for command-line access. If you really need SSH access, then version 5.x can restrict access to SSH to a minimal set of authorized IP addresses.</p>
<p>Whether you call it a backdoor or a “management authentication issue,” it’s still a pretty major issue for some sysadmins, and they are unlikely to be happy about the news.</p>
<p>One significant part of Fortinet’s statement was the assertion that this didn’t come from an external party. Ever since the Juniper backdooring security vendors have been at pains to avoid any suggestion that they are allowing intelligence agencies access to their products.</p>
<p>In the meantime, if you are using FortiOS then make sure the fimrware is up to date. The news of this hole will have the malicious hacking community aflutter and many are no doubt already scanning for vulnerable targets.</p></blockquote>
<p>There are some work arounds, what I’d personally like to see though is more transparency about the process and decisions made that led to this code being on production firewalls. How does this even happen?</p>
<p>And how did they only find it during scheduled review and testing? What kind of testing/QA/CI process do they have?</p>
<p>It all sounds rather fishy to me.</p>
<p>Source: <a href="https://www.theregister.co.uk/2016/01/12/fortinet_bakdoor/">The Register</a></p>
</section>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&#038;title=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" data-a2a-url="https://cvtfstudios.net/3399-2/" data-a2a-title="Fortinet SSH Backdoor Found In Firewalls"></a></p><p>The post <a href="https://cvtfstudios.net/3399-2/">Fortinet SSH Backdoor Found In Firewalls</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/3399-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>8 Reasons to Switch from Windows 10 to Linux</title>
		<link>https://cvtfstudios.net/8-reasons-switch-windows-10-linux/</link>
					<comments>https://cvtfstudios.net/8-reasons-switch-windows-10-linux/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sun, 20 Mar 2016 14:02:27 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[IT Industry]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Switch to Linux]]></category>
		<guid isPermaLink="false">http://cvtfstudios.net/?p=3331</guid>

					<description><![CDATA[<p>Derrik Diener 9th Jan 2016 Linux, Windows 150 Comments Windows 10 has been out in the wild for a while now. For the most part, people have been really liking it. It’s probably the most streamlined version of Microsoft’s operating system to date. Still, some people aren’t happy with the upgrade and are looking at  [...]</p>
<p>The post <a href="https://cvtfstudios.net/8-reasons-switch-windows-10-linux/">8 Reasons to Switch from Windows 10 to Linux</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<header class="entry-header"><img decoding="async" class="aligncenter  wp-image-70757" src="https://cvtfstudios.net/wp-content/uploads/2016/03/Switch-from-windoze-to-Linux.jpeg" alt="" width="812" height="382" srcset="https://cvtfstudios.net/wp-content/uploads/2016/03/Switch-from-windoze-to-Linux-200x94.jpeg 200w, https://cvtfstudios.net/wp-content/uploads/2016/03/Switch-from-windoze-to-Linux-300x141.jpeg 300w, https://cvtfstudios.net/wp-content/uploads/2016/03/Switch-from-windoze-to-Linux-400x188.jpeg 400w, https://cvtfstudios.net/wp-content/uploads/2016/03/Switch-from-windoze-to-Linux-500x235.jpeg 500w, https://cvtfstudios.net/wp-content/uploads/2016/03/Switch-from-windoze-to-Linux-600x282.jpeg 600w, https://cvtfstudios.net/wp-content/uploads/2016/03/Switch-from-windoze-to-Linux.jpeg 693w" sizes="(max-width: 812px) 100vw, 812px" /></p>
<h6 class="entry-meta"><span class="entry-meta-content"><i class="icon-user"></i> <span class="entry-author"><a class="entry-author-link" href="https://www.maketecheasier.com/author/derrikdiener/" rel="author"><span class="entry-author-name">Derrik Diener</span></a></span></span> <span class="entry-meta-content"><i class="icon-calendar"></i> 9th Jan 2016</span> <span class="entry-meta-content hidden-phone"><i class="icon-tag"></i> <a href="https://www.maketecheasier.com/category/linux-tips/">Linux</a>, <a href="https://www.maketecheasier.com/category/windows-tips/">Windows</a></span> <span class="entry-meta-content hidden-phone"><i class="icon-bubble"></i> <span class="entry-comments-link"> <a href="https://www.maketecheasier.com/switch-windows-10-to-linux/#comments">150 Comments</a></span></span></h6>
</header>
<div id="sharebar" class="">Windows 10 has been out in the wild for a while now. For the most part, people have been really liking it. It’s probably the most streamlined version of Microsoft’s operating system to date. Still, some people aren’t happy with the upgrade and are looking at alternatives.</div>
<div class="entry-content">
<div id="MTE_in_content_ad"></div>
<p>Introducing Linux: it’s a free and open source platform which many operating systems are built upon. If you’re looking to move from Windows to an alternative, here are eight compelling reasons why you should leave Microsoft for a more free and open source operating system.</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2F8-reasons-switch-windows-10-linux%2F&amp;linkname=8%20Reasons%20to%20Switch%20from%20Windows%2010%20to%20Linux" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2F8-reasons-switch-windows-10-linux%2F&amp;linkname=8%20Reasons%20to%20Switch%20from%20Windows%2010%20to%20Linux" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2F8-reasons-switch-windows-10-linux%2F&amp;linkname=8%20Reasons%20to%20Switch%20from%20Windows%2010%20to%20Linux" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2F8-reasons-switch-windows-10-linux%2F&amp;linkname=8%20Reasons%20to%20Switch%20from%20Windows%2010%20to%20Linux" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2F8-reasons-switch-windows-10-linux%2F&amp;linkname=8%20Reasons%20to%20Switch%20from%20Windows%2010%20to%20Linux" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2F8-reasons-switch-windows-10-linux%2F&amp;linkname=8%20Reasons%20to%20Switch%20from%20Windows%2010%20to%20Linux" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2F8-reasons-switch-windows-10-linux%2F&#038;title=8%20Reasons%20to%20Switch%20from%20Windows%2010%20to%20Linux" data-a2a-url="https://cvtfstudios.net/8-reasons-switch-windows-10-linux/" data-a2a-title="8 Reasons to Switch from Windows 10 to Linux"></a></p><p>The post <a href="https://cvtfstudios.net/8-reasons-switch-windows-10-linux/">8 Reasons to Switch from Windows 10 to Linux</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/8-reasons-switch-windows-10-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Use SSH Pipes on Linux</title>
		<link>https://cvtfstudios.net/use-ssh-pipes-linux/</link>
					<comments>https://cvtfstudios.net/use-ssh-pipes-linux/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sun, 20 Mar 2016 13:35:02 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux Security]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[SSH Pipes on Linux]]></category>
		<guid isPermaLink="false">http://cvtfstudios.net/?p=3319</guid>

					<description><![CDATA[<p>Like most commands on Linux, SSH can be used with input/output redirection via |Unix Pipe. SSH can be used with this pipeline too. The basic concept here is understanding how the Unix pipeline works. When you understand the way pipes work, you can get seriously creative. This article covers what happens when you combine Unix  [...]</p>
<p>The post <a href="https://cvtfstudios.net/use-ssh-pipes-linux/">How to Use SSH Pipes on Linux</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="aligncenter size-large wp-image-70749" src="https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-1024x830.png" alt="" width="1024" height="830" srcset="https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-177x142.png 177w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-200x162.png 200w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-300x243.png 300w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-400x324.png 400w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-500x406.png 500w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-600x487.png 600w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-700x568.png 700w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-800x649.png 800w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-1024x830.png 1024w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-1200x973.png 1200w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy.png 1344w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>Like most commands on Linux, SSH can be used with input/output redirection via <code>|</code>Unix Pipe. SSH can be used with this pipeline too. The basic concept here is understanding how the Unix pipeline works.<br />
When you understand the way pipes work, you can get seriously creative. This article covers what happens when you combine Unix pipes and SSH. It should be noted that since Unix pipes can be just about anything, there are no doubt going to be commands not on this list would also be useful.</p>
<h2 class="nolinks">Understanding the Unix Pipeline</h2>
<p>Pipes on Unix (and by extension, Linux) are used to chain programs together and make them work together. For example, using <code>cat</code>, you can show the contents of a file, but if you used a pipe, you could chain the <code>cat</code> command to the <code>more</code> command to make the file easier to read through.</p>
<div class="holsh-div">
<div class="bash">
<pre>cat file1 | more</pre>
</div>
</div>
<p>&nbsp;</p>
<p>The basic idea here is this: <code>program1 fileX | program2</code>. It’s not just limited to one file and two programs, though. Piping can get about as advanced as you need it to be with as many modifiers as you can think of.</p>
<p><strong>Note:</strong> Some types of pipes can be done without using the <code>|</code>. Some may use <code>&gt;</code> instead.</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&#038;title=How%20to%20Use%20SSH%20Pipes%20on%20Linux" data-a2a-url="https://cvtfstudios.net/use-ssh-pipes-linux/" data-a2a-title="How to Use SSH Pipes on Linux"></a></p><p>The post <a href="https://cvtfstudios.net/use-ssh-pipes-linux/">How to Use SSH Pipes on Linux</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/use-ssh-pipes-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
