#dpkg
Explore tagged Tumblr posts
Text
List Installed Packages On APT Distro. Sorting By Size.
dpkg-query -W -f '${Installed-Size;5} ${Package}\n' | sort -rn
1 note
·
View note
Link
APT (Advanced Package Tool) is an accessible software user interface that works with core libraries to handle the installation and removal of software on Debian, Ubuntu, and other Linux distributions. Apt provides a simple, safe, and efficient way of managing software. APT simplifies managing software on Linux systems by automating the retrieval, configuration, and installation of software packages. This article introduces a new front-end for apt called Nala, which has many new features.
0 notes
Text
random fun debian fact for tonight, if you got a .deb file and it won't install when you open it (or it shows what's inside instead), right click on it, go to properties => open with => select "Software install"
#i know this might sound silly or obvious but dont use dpkg or something for this#and it wasnt set by default
1 note
·
View note
Text
在WSL Ubuntu 20.04 安裝中文包
WSL是微軟輕量化的子系統, 為的是讓開發人員能夠直接在 Windows 執行Linux相關的應用程式, 之前也介紹了不少WSL上面的應用, 今天則是要來教大家 在WSL Ubuntu 20.04 安裝中文包 在WSL執行一些應用程式有時候讀取或顯示中文會有問題, 就像底下圖片一樣, 這是執行meld 進行檔案比對的時候, 中文並未正常顯示 這是由於輕量化後的WSL 中沒有中文包的緣故, 所以需要自行安裝與設定 首先安裝中文語言包 sudo apt install language-pack-zh-hant 接著執行底下命令進行設定: sudo dpkg-reconfigure locales 選好數個要支援的語言: 此處選擇 en, zh_TW BIG5, zh_TW.UTF8 並在下一頁選擇預設的語言, 建議選擇 en 或者…
View On WordPress
#dpkg-reconfigure locales#fc-cache -f -v#fontconfig#language-pack-zh-hant#local.conf#WSL Ubuntu 20.04#WSL中文顯示#WSL顯示中文#zh_TW.UTF8#中文亂碼#安裝中文包
0 notes
Text
Guess who just learned pop-os uses systemd and that grub wss only in there for legacy mode and so it could solidify my initial misremembering of which bootloader I had! I fucking hate working with computers why do I do this to myself.
Shit what the fuck just happened? Did Windows randomly decide to overwrite grub? Both my drives seem to have the Windows bootloader on now. I can't even access the EFI partition from Windows and I'm unable to boot into Linux now?
#after some messing around breaking dpkg I managed to get everything back to normal again#my current opinion on computers will have calmed down by like tuesday probably#linux
18 notes
·
View notes
Note
The v22 installer fucked up so bad that it deleted dpkg and gave me COVID, care to explain yourself?
your mom
55 notes
·
View notes
Text
Getting Undertale running on linux in 2024: a guide for those that cannot be assed on debian-based distributions
Step one: TRY.
this is for the humblebundle downloads only, unfortunately. i don't have + can't test the steam version. unzip. get into the folder. try good ol ./UNDERTALE on the runnable-looking thing. if that doesn't work, try chmod +x UNDERTALE and chmod +x game/runner for good measure and repeat.
if you managed that and it runs, congratulations!! YOU WON. otherwise:
Step two: SCREAM.
You probably got cryptic messages about stuff not being found when you caN SEE THEM RIGHT THERE. it's okay. it's an old game on an old engine. it's 32-bit. the messages don't help with diagnozing that but if it's THAT sort of message IT'S THE 32-BIT BULLSHIT. continue to step three.
Step three: 32-bit libs the easy part.
sudo apt install lib32z1 . try to run it again. restart if no change. now you're probably met with something MUCH more helpful and specific, like:
don't give up you're getting closer!!
Step four: 32-bit libs the bug-squashing part.
this one is annoying but you only have to do it once per machine i love you
okay, first, setup your machine for the 32-libs with
sudo dpkg --add-architecture i386 sudo apt update
^ you won't need to repeat this ever again. you're good. NOW. hunt down where the files you want are in your package directiories, depending on the distributions. I was missing libstdc++.so.6. it was in the package libstdc++6. notice the pattern. it's lowercase[number after 'so'] if you're on debian or ubuntu you'll probably only have to plug this pattern in and you're GOOD.
sudo apt install libstdc++6:i386
^ the colon part is important! that's the 32 bit bit.
wait for the install to finish, try to run the executable again and hunt down the next library . rinse and repeat until undertale kicks in and RUNS. THat's it!!! you're done, hopefully!!
the libraries I was personally missing were: libXxf86vm.so.1, libGL.so.1, libopenal.so.1, libXranr.so.2 and libGLU.so.1. I installed them from the packages libxxf86vm1:i386, libgl1:i386, libopenal1:i386, libxrandr2:i386 and libglu1:i386. all were conforming to the pattern earlier.
step five: undered. tal <3
okay now how to tag this when in two years I want to play undertale again on a new machine.
#undertale#tech#uhhh#linux#debian#ubuntu#im mostly just savinv this on a searchable blog for next time I want to explode over thishfakjhsfl
24 notes
·
View notes
Text
I'm sick and tired of companies only providing deb packages it fucking sucks I now have to compile dpkg for Fedora of which isn't a problem for me, but I shouldn't need to do it
16 notes
·
View notes
Text
-> How To See Contents of A .DEB Debian / Ubuntu Package File
3 notes
·
View notes
Text
omg i FINALLY managed to change my desktop environment from unity back to GNOME!!
it was a super long and arduous process, because unbeknownst to me (well i may have subconsciously known but was ignoring it) the time i accidentally switched to unity i also switched from gdm3 to lightgdm and downloaded xubuntu and xfce on top of my regular ubuntu os and thought i'd reverted these changes but had not
and then i was trying to follow all these tutorials that were like "it's so easy, you just download gnome and then on log-in, you select gnome instead of unity" and i was like, okay, but there's nowhere to select gnome?! (turns out because my login screen was this lightgdm version that came with the xubuntu/xfce install so it didn't have this option; i had assumed the login screen just looked funny because it was unity)
if anyone else ends up with this very particular problem here's the trick: if you want to fully remove xubuntu/xfce, you need to switch from lightgdm to gdm3 by typing:
sudo dpkg-reconfigure gdm
into the command line.
Only then can you actually fully uninstall xubuntu/xfce in a way so that it's genuinely gone, and any tutorial for removing xubuntu/xfce that doesn't have the above gdm-switching line is only gonna lead to more frustration as you uninstall it over and over and keep restarting your computer only to see the xubuntu logo show up
(yes, i made all these changes by accident while having no understanding of what all those things were (still don't honestly); i actually accidentally switched to unity in a disastrous attempt to revert the xubuntu/xfce change and thought i had succeeded, oops... yeah, i am very technophobic)
anyway, this is huge for me, i have been suffering with os-weirdness for about a month now because i always had something coming up and didn't want to risk screwing up my os even more
#huge sigh of relief#trivalent's technology problems#i'm a millenial i swear i'm just technologically impaired
1 note
·
View note
Text
#TheeWaterCompany
#CyberSecurity #Risk #Reward
!/bin/bash
BACKUP_DIR="/backup" DATA_DIR="/important_data/" ENCRYPTED_BACKUP="$BACKUP_DIR/encrypted_backup_$(date +%F).gpg"
tar -czf $BACKUP_DIR/backup_$(date +%F).tar.gz $DATA_DIR gpg --symmetric --cipher-algo AES256 --output $ENCRYPTED_BACKUP $BACKUP_DIR/backup_$(date +%F).tar.gz rm -f $BACKUP_DIR/backup_$(date +%F).tar.gz echo "Encrypted backup completed."
To refine encryption-related code, consider the following improvements:
Use Stronger Algorithms: Implement AES256 instead of AES128 for better encryption strength.
Add Error Handling: Ensure that the encryption process handles errors, such as failed encryption or permission issues.
Secure Storage of Keys: Use a secure method to store encryption keys (e.g., environment variables or hardware security modules).
Refined Script Example:
!/bin/bash
Encrypt sensitive data with AES256 and store encrypted backup securely
BACKUP_DIR="/backup" ENCRYPTED_BACKUP="/backup/encrypted_backup_$(date +%F).gpg" DATA_DIR="/important_data/"
Perform backup of important files
tar -czf $BACKUP_DIR/backup_$(date +%F).tar.gz $DATA_DIR
Encrypt the backup with AES256
gpg --batch --yes --symmetric --cipher-algo AES256 --output $ENCRYPTED_BACKUP $BACKUP_DIR/backup_$(date +%F).tar.gz
Remove the unencrypted backup file
rm -f $BACKUP_DIR/backup_$(date +%F).tar.gz echo "Backup and encryption completed securely."
This script enhances security by using AES256 and ensures encrypted files are properly handled.
To proceed with creating scripts for securing water companies' networks, we would outline some basic examples and operational strategies that could be implemented. Here’s a breakdown of each element:
Monitoring and Intrusion Detection
These scripts would monitor traffic and detect any suspicious activity on the network.
Example Script: Network Traffic Monitoring
!/bin/bash
Monitor network traffic and detect anomalies
LOGFILE="/var/log/network_traffic.log" ALERT_FILE="/var/log/alerts.log"
Use 'netstat' to monitor active network connections
netstat -an > $LOGFILE
Check for unusual activity, such as unexpected IP addresses
grep "192.168." $LOGFILE | grep -v "127.0.0.1" > $ALERT_FILE if [ -s $ALERT_FILE ]; then echo "Unusual activity detected!" | mail -s "Security Alert: Network Anomaly Detected" [email protected] fi
This script monitors network traffic using netstat, checks for connections from suspicious IP addresses, and sends an alert if any are found.
Intrusion Prevention (Automated Response)
This script would automatically take action to block malicious activity upon detection.
Example Script: IP Blocking on Intrusion Detection
!/bin/bash
Block suspicious IP addresses detected during intrusion attempts
SUSPICIOUS_IPS=$(grep "FAILED LOGIN" /var/log/auth.log | awk '{print $NF}' | sort | uniq)
for ip in $SUSPICIOUS_IPS; do iptables -A INPUT -s $ip -j DROP echo "$ip has been blocked due to multiple failed login attempts" >> /var/log/security_block.log done
This script automatically blocks IP addresses with failed login attempts, adding a layer of protection by preventing brute-force attacks.
Security Updates and Patch Management
Automated patch management ensures that all security vulnerabilities are addressed as soon as updates are available.
Example Script: Automatic Updates
!/bin/bash
Update system packages and apply security patches
echo "Updating system packages…" apt-get update -y apt-get upgrade -y apt-get dist-upgrade -y
Apply only security updates
apt-get install unattended-upgrades dpkg-reconfigure -plow unattended-upgrades
This script ensures that the system receives the latest security patches automatically, which is essential for keeping critical infrastructure secure.
Data Encryption and Backup
Regular backups and ensuring sensitive data is encrypted are vital.
Example Script: Data Encryption and Backup
!/bin/bash
Encrypt sensitive data and create backups
BACKUP_DIR="/backup" ENCRYPTED_BACKUP="/backup/encrypted_backup.gpg"
Perform backup of important files
tar -czf $BACKUP_DIR/backup_$(date +%F).tar.gz /important_data/
Encrypt the backup
gpg --symmetric --cipher-algo AES256 $BACKUP_DIR/backup_$(date +%F).tar.gz
Remove the unencrypted backup file after encryption
rm -f $BACKUP_DIR/backup_$(date +%F).tar.gz echo "Backup and encryption completed."
This script automates backups of sensitive data and encrypts it using gpg with AES256 encryption, ensuring that even if data is accessed illegally, it cannot be read without the encryption key.
Access Control
Strong access control is necessary to ensure that only authorized personnel can access critical systems.
Example Script: Access Control with Multi-Factor Authentication (MFA)
!/bin/bash
Ensure all users have MFA enabled for critical systems
Check if MFA is enabled on SSH login
if ! grep -q "auth required pam_google_authenticator.so" /etc/pam.d/sshd; then echo "MFA is not enabled on SSH. Enabling MFA…" echo "auth required pam_google_authenticator.so" >> /etc/pam.d/sshd service sshd restart else echo "MFA is already enabled on SSH." fi
This script checks if multi-factor authentication (MFA) is enabled on SSH logins, and if not, it enables it, ensuring an additional layer of security.
Security Audits
Regular audits help identify vulnerabilities and ensure the system is secure.
Example Script: Automated Security Audit
!/bin/bash
Run a security audit to check for common vulnerabilities
Check for open ports
echo "Checking for open ports…" nmap -p 1-65535 localhost > /var/log/open_ports.log
Check for outdated software
echo "Checking for outdated software…" apt list --upgradable > /var/log/outdated_software.log
Check file permissions for sensitive files
echo "Checking file permissions…" find /etc /var /usr -type f -name "*.conf" -exec ls -l {} \; > /var/log/file_permissions.log
Send the audit report to the administrator
mail -s "Security Audit Report" [email protected] < /var/log/security_audit_report.log
This script performs a security audit, checking for open ports, outdated software, and sensitive file permission issues, then sends a report to the administrator.
Conclusion
These scripts are designed to help secure the water companies' networks by automating essential security functions like monitoring, response to threats, patching, encryption, and access control. It’s important that these scripts be customized to the specific needs of each company, taking into account their existing systems, infrastructure, and any unique security concerns they may face. Additionally, regular updates to these scripts will be necessary as new vulnerabilities and threats emerge.
For a basic firewall script that blocks unauthorized access and monitors network traffic, here's an example:
!/bin/bash
Define allowed IPs (replace with actual allowed IP addresses)
ALLOWED_IPS=("192.168.1.1" "192.168.1.2")
Block all incoming connections by default
iptables -P INPUT DROP iptables -P FORWARD DROP iptables -P OUTPUT ACCEPT
Allow traffic from specified IPs
for ip in "${ALLOWED_IPS[@]}"; do iptables -A INPUT -s $ip -j ACCEPT done
Log and monitor incoming traffic
iptables -A INPUT -j LOG --log-prefix "Firewall Log: " --log-level 4
This script sets a default block on incoming connections, allows traffic from specific IP addresses, and logs all traffic for monitoring.
0 notes
Text
...hey...you.. aeh.. aeh.. is it.. aeh.. possible.. aeh..your aeh.. heros aeh.. programmed the ... .. windows taskmanager? then #friendlytease #homage @debian @linux @cnet @techpowerup @wired @pcwelt @windowsdev why arentyou shocked your wlan password laysaround cleartext in linux there. etc network or networkmanager your wpa_supplicant too ////
…hey…you.. aeh.. aeh.. is it.. aeh.. possible.. aeh..your aeh.. heros aeh.. programmed the … .. windows taskmanager? then #friendlytease #homage @debian @linux @cnet @techpowerup @wired @pcwelt @windowsdev why arentyou shocked your wlan password laysaround cleartext in linux there. etc network or networkmanager your wpa_supplicant too //// p h e w for dpkg –force-all breaking module dependencies…
0 notes
Text
Debcow: Optimización de Paquetes Debian para Sistemas de Archivos Copy-On-Write
El proyecto Debcow representa una innovación en la gestión de paquetes para Debian en sistemas de archivos Copy-On-Write (CoW) como Btrfs y Bcachefs. Al adaptar el gestor de paquetes DPKG para trabajar con “reflinks”, este método permite enlaces directos al contenido de los archivos en lugar de duplicarlos. Esto no solo ahorra espacio, sino que también acelera significativamente los tiempos de…
0 notes
Text
Como Resolver o Erro "dpkg-deb: lzma error: compacted data is corrupt" no Debian 12 e Ubuntu
Se você está utilizando o Debian 12 ou Ubuntu e encontrou o erro relacionado ao dpkg-deb indicando que um pacote corrompido está impedindo a atualização do sistema, não se preocupe. Esse problema é relativamente comum e pode ser resolvido com alguns passos simples. Neste artigo, mostramos como corrigir o erro de forma eficiente. O Problema A mensagem de erro pode ser parecida com…
View On WordPress
0 notes
Text
How to Safely Free Up Space in the Boot Partition on Ubuntu
Key Takeaways To free up space in boot partition, you can use the “sudo apt autoremove” command or, with a specific package name, the “dpkg –purge” command. These commands can remove the old unused kernels to free space in the boot partition. You can use a graphical application like Synaptic for managing and deleting the old kernels. Using this tool, you can mark multiple kernel packages for…
0 notes
Text
Hướng dẫn cài đặt Docker trên Ubuntu 22.04 chi tiết
Trong bài viết này, chúng ta sẽ cùng tìm hiểu cách cài đặt Docker trên Ubuntu 22.04, một công cụ mạnh mẽ và linh hoạt trong việc quản lý container. Docker giúp việc triển khai ứng dụng trở nên nhanh chóng, tiện lợi và tối ưu hóa tài nguyên. Nếu bạn đang sử dụng Ubuntu 22.04 và muốn thiết lập môi trường Docker để phát triển hoặc triển khai ứng dụng, hãy theo dõi hướng dẫn chi tiết dưới đây.
Giới thiệu về Docker CE
Docker CE (Community Edition) là một phiên bản mã nguồn mở của Docker, được thiết kế để dành cho cộng đồng người dùng và nhà phát triển. Đây là phiên bản Docker phổ biến nhất, phù hợp cho các dự án cá nhân hoặc các môi trường sản xuất quy mô nhỏ và trung bình.
Các tính năng chính:
Mã nguồn mở: Docker CE là một dự án mã nguồn mở, cung cấp quyền truy cập vào mã nguồn của Docker, cho phép cộng đồng đóng góp, kiểm tra và cải thiện phần mềm.
Đa nền tảng: Docker CE hỗ trợ nhiều hệ điều hành, bao gồm Linux, Windows và macOS, giúp đảm bảo tính linh hoạt khi triển khai ứng dụng trên các môi trường khác nhau.
Containerization: Docker CE cho phép tạo ra các container độc lập, chứa đầy đủ môi trường cần thiết để chạy một ứng dụng, giúp tránh các xung đột về môi trường hoặc phụ thuộc khi triển khai.
Quản lý hình ảnh: Docker CE cung cấp khả năng tạo và quản lý các hình ảnh Docker. Mỗi hình ảnh là một bản sao của một ứng dụng cụ thể, bao gồm tất cả các phụ thuộc của nó.
Docker Hub: Docker CE tích hợp với Docker Hub, bạn có thể tải lên, chia sẻ và truy cập hàng ngàn hình ảnh từ cộng đồng.
Docker Compose: Docker CE đi kèm với Docker Compose, một công cụ cho phép định nghĩa và quản lý nhiều container như một dịch vụ duy nhất, giúp dễ dàng triển khai các ứng dụng phức tạp.
Orchestration: Hỗ trợ các tính năng quản lý và điều phối container, như Docker Swarm để quản lý nhiều container trên nhiều host.
Các bước cài đặt Docker trên Ubuntu 22.04
Mặc định gói cài đặt đã có sẵn trong repo của ubuntu, nhưng đó không phải là bản mới nhất. Dưới đây là cách để bạn tải Docker phiên bản mới nhất
Bước 1: Cập nhật hệ thống
sudo apt update
Bước 2: Cài đặt các gói phụ thuộc
sudo apt install apt-transport-https ca-certificates curl software-properties-common
Bước 3: Thêm khóa GPG cho kho lưu trữ Docker
curl -fsSL https://download.Docker.com/linux/ubuntu/gpg | sudo gpg --dearmor -o /usr/share/keyrings/Docker-archive-keyring.gpg
Bước 4: Thêm kho lưu trữ Docker vào nguồn APT
echo "deb [arch=$(dpkg --print-architecture) signed-by=/usr/share/keyrings/Docker-archive-keyring.gpg] https://download.Docker.com/linux/ubuntu $(lsb_release -cs) stable" | sudo tee /etc/apt/sources.list.d/Docker.list > /dev/null
Bước 5: Cập nhật lại danh sách gói
sudo apt update
Bước 6: Kiểm tra kho lưu trữ Docker
apt-cache policy docker-ce
Bước 7: Cài đặt Docker phiên bản mới nhất
sudo apt install docker-ce
Bước 8 (Nếu cần): Nếu bạn muốn user mà bạn đăng nhập sử dụng Docker chứ không chỉ mỗi tài khoản root
sudo usermod -aG docker ${USER}
Kiểm tra sau khi cài đặt Docker trên Ubuntu 22.04
Sau khi cài đặt Docker CE xong ta cũng cần kiểm tra xem Docker đã chạy chưa và đang dùng version bao nhiêu
sudo systemctl status docker
sudo docker version
Tổng kết
Docker CE tích hợp Docker Compose, Dockerfile, và nhiều công cụ khác để cung cấp một giải pháp toàn diện cho việc quản lý container. Với Docker CE, bạn có thể dễ dàng tạo, triển khai, và quản lý các ứng dụng container hóa, đồng thời tận dụng sự hỗ trợ mạnh mẽ từ cộng đồng. Điều này giúp cho Docker CE trở thành lựa chọn hàng đầu cho các nhà phát triển, nhóm phát triển nhỏ, và cả những người mới bắt đầu tìm hiểu về công nghệ container.
Nguồn: https://suncloud.vn/cai-dat-docker-tren-ubuntu
0 notes