Malicious npm Package Attacks Linux Developers to Install SSH Backdoors

Malicious npm Package Attacks Linux Developers to Install SSH Backdoors

Introduction A concerning new type of supply chain attack has emerged, targeting Linux developers working with the Telegram bot ecosystem. Discovered in early 2025, multiple malicious npm packages disguised themselves as legitimate Telegram bot libraries to provide SSH backdoors and steal sensitive data from unsuspecting developers. These domain-squatted packages accumulated approximately 300 downloads over several … Read more

Linux File Permission Management

Linux File Permission Management

1. The “Genetic Code” of File Permissions 1. File Type Identifiers First Character File Type Typical Examples d Directory /home, /var/log – Regular File index.html, app.py l Symbolic Link /usr/bin/python3 → python3.9 b/c Block Device/Character Device File /dev/sda (disk), /dev/ttyS0 (serial port) 2. Structure of Permission Triplets The permissions for each user type are composed … Read more

Linux USB Audio Driver Vulnerability Exploited by Malicious USB Devices in the Wild

Linux USB Audio Driver Vulnerability Exploited by Malicious USB Devices in the Wild

A critical vulnerability exists in the USB audio driver of the Linux kernel that may lead to out-of-bounds memory reads. This vulnerability has been patched by Takashi Iwai from SUSE. If an attacker gains physical access to the system, they can exploit malicious USB devices to achieve privilege escalation, tamper with system memory, or execute … Read more

Monitoring and Tuning the Linux Networking Stack: Receiving Data (1) – Network Device Initialization

Monitoring and Tuning the Linux Networking Stack: Receiving Data (1) - Network Device Initialization

Monitoring and Tuning the Linux Networking Stack: Receiving Data In Brief This blog post explains how computers running the Linux kernel receive packets and how to monitor and tune various components of the networking stack as packets flow from the network to user-space programs. Update: We have published a corresponding article: “Monitoring and Tuning the … Read more

Linux Users Rejoice: Wine 10.6 Released, Gaming and Photo Editing Finally Smooth?

Linux Users Rejoice: Wine 10.6 Released, Gaming and Photo Editing Finally Smooth?

Good news for Linux and macOS users!Wine 10.6 has officially been released as the sixth update of the stable 10.x series. This update is not just a patch for the previous version; more importantly, it brings several significant upgrades that tech enthusiasts are excited about. Wine is a free and open-source compatibility layer that allows … Read more

Essential for Linux Beginners! The pstree Command: A Visual Representation of Process Trees

Essential for Linux Beginners! The pstree Command: A Visual Representation of Process Trees

In Linux systems, process management is a very important function. The pstree command displays running processes in a tree diagram format, which is more intuitive than the ps command, making the output visually appealing. Today, we will learn about this super useful command—pstree.1. What is the pstree Command?The pstree command is used to display running … Read more

Setting Up a Lightweight Personal Blog VanBlog on Linux and Accessing It Remotely

Setting Up a Lightweight Personal Blog VanBlog on Linux and Accessing It Remotely

Introduction Today, I will share how to set up a lightweight personal blog, VanBlog, on the Linux Ubuntu system, and use the Cpolar internal network penetration software to generate a public address for easy remote access to the locally deployed site anytime, anywhere. No public IP is required, and there’s no need to set up … Read more

Eight Commonly Used Linux Performance Monitoring Commands: How Many Have You Used?

Eight Commonly Used Linux Performance Monitoring Commands: How Many Have You Used?

Image source: Internet In Linux systems, there are many performance monitoring tools. Below, I will introduce several commonly used command-line tools. 1. top/htop top: Function: Real-time monitoring of processes, displaying information about CPU, memory, load, swap space, etc. Common Shortcuts: Shortcut Description M Sort by memory usage P Sort by CPU usage k Kill a … Read more

The Three Elements of Linux Configuration: The Synergy of Files, Commands, and Interfaces

The Three Elements of Linux Configuration: The Synergy of Files, Commands, and Interfaces

🌟 The Three Elements of Linux Configuration: The Synergy of Files, Commands, and Interfaces 💡 Introduction: In the world of Linux, almost everything can be configured and customized. From kernel parameters to user environments, from network protocols to hardware drivers, the flexibility of configuration is one of the reasons why Linux is powerful and widely … Read more