Tool Tips
BleachBit 1.6
Decluttering systems
Source: http://bleachbit.sourceforge.net
License: GPLv3
Alternatives: None
BleachBit deletes temporary files from more than 100 applications. Most of them may provide their own functions for cleaning up, but the Python program collects them in a central interface. This professional cleaner works in KDE, Gnome, and Xfce and is also available for Windows on download sites.
BleachBit cleans up the data from browsers, office suites, media players, chat clients, and the graphical user interface itself. The tool even clears up at a system level – it needs root privileges for this – and deletes language packs (locales), rotating logs, and temporary files that are no longer needed. If desired, it will also clean up swap and free memory. In doing so, it also removes data that is still in shared memory. A few years ago, this led to problems and program crashes in KDE, which is why some KDE users advise against using BleachBit.
In configuration, users can determine which data they want to delete by clicking checkboxes. Detailed explanations about the actions are provided on the right-hand side of the window. The tool provides a command-line interface for automating or integration with your own scripts, and it is possible to integrate your own cleaning modules; the configuration uses XML files.
4 Stars BleachBit reliably cleans disks. Users should thoroughly test their configuration before use on production systems.
fehashmac 1.4.2
Collection of hash algorithms
Source: http://sourceforge.net/projects/fehashmac
License: GPLv3
Alternatives: Hashrat, RHash
Hash algorithms for calculating checksums are ubiquitous in IT; most algorithms provide their own tools for calculating the values. Fehashmac has almost 50 hash algorithms and checksums and integrates them into a single command-line tool. These include not only classics such as MD4 and MD5, but also modern variants such as SHA1, SHA512, Tiger2, and SHA3.
The tool also provides multiple variants from each family of algorithms. In the command line, users can determine the desired algorithm with the -a
parameter. Fehashmac creates a separate command for each algorithm during installation to make life easier for users. These are symbolic links that point to the fehashmac binary. Therefore, it's sufficient to invoke the respective command together with the file or text line when computing a checksum. Anyone wanting to verify checksums with all algorithms for a file should define this at startup using -a all
. Further options state the key values or messages as hexadecimal strings. The tool does not have a man page, meaning that users have to search for information in the complex online help.
3 Stars Fehashmac is a veritable Swiss army knife when it comes to calculating checksums and hash algorithms. The tool requires a bit of familiarization, and the missing manual makes life difficult for newcomers.
Sshguard 1.5
Secures SSH ports
Source: http://www.sshguard.net
License: BSD
Alternatives: Fail2ban
With Sshguard, you can protect your SSH service against intrusion attempts. The tool cooperates well with common firewall solutions such as iptables, Netfilter, PF, IPFW, and IPFilter and even blocks intruders when establishing a connection. Sshguard evaluates logfiles to identify attackers. Users specify the protocol at startup using the -l
option.
By default, the tool blocks IPs that have misbehaved more than 40 times; that is, connections that match specific attack signatures. The monitoring tool is familiar with 15 attacks altogether – most relate to SSH but includes attacks on Dovecot, Sendmail, vsftp, ProFTP, and Exim services as well. If a remote computer has exceeded the limit, Sshguard blocks its address for seven minutes by default. You can specify addresses or whole domains for Sshguard to exclude with the -w
option.
Anyone wanting to make sure particularly stubborn attackers are blocked forever can do so by setting a limit and a blacklist with -b
. This is where Sshguard stores the addresses for computers you want to lock out permanently. To remove an IP from this list, users can edit the list in a text editor.
5 Stars The Sshguard log monitor reliably prevents intrusion attempts. The tools works well with common firewall solutions and now also supports other services. The documentation on the website helps with setup.
« Previous 1 2
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Canonical Bumps LTS Support to 12 years
If you're worried that your Ubuntu LTS release won't be supported long enough to last, Canonical has a surprise for you in the form of 12 years of security coverage.
-
Fedora 40 Beta Released Soon
With the official release of Fedora 40 coming in April, it's almost time to download the beta and see what's new.
-
New Pentesting Distribution to Compete with Kali Linux
SnoopGod is now available for your testing needs
-
Juno Computers Launches Another Linux Laptop
If you're looking for a powerhouse laptop that runs Ubuntu, the Juno Computers Neptune 17 v6 should be on your radar.
-
ZorinOS 17.1 Released, Includes Improved Windows App Support
If you need or desire to run Windows applications on Linux, there's one distribution intent on making that easier for you and its new release further improves that feature.
-
Linux Market Share Surpasses 4% for the First Time
Look out Windows and macOS, Linux is on the rise and has even topped ChromeOS to become the fourth most widely used OS around the globe.
-
KDE’s Plasma 6 Officially Available
KDE’s Plasma 6.0 "Megarelease" has happened, and it's brimming with new features, polish, and performance.
-
Latest Version of Tails Unleashed
Tails 6.0 is based on Debian 12 and includes GNOME 43.
-
KDE Announces New Slimbook V with Plenty of Power and KDE’s Plasma 6
If you're a fan of KDE Plasma, you'll be thrilled to hear they've announced a new Slimbook with an AMD CPU and the latest version of KDE Plasma desktop.
-
Monthly Sponsorship Includes Early Access to elementary OS 8
If you want to get a glimpse of what's in the pipeline for elementary OS 8, just set up a monthly sponsorship to help fund its continued existence.