If you are a Linux user, especially if you are also an AMD user, then you must know that in Kernel 5.16 later, there will be a significant increase in AMD Ryzen CPU performance.
Based on the outstanding benchmarks, there is an increase of 28% from the Kernel 5.15 version that was present before, you can see the following benchmark results:
The benchmark above was carried out on a Lenovo ThinkPad T14s Gen2 laptop with Ryzen 7 PRO 5850U. the CPU 5850U is an octa-core processor based on the Zen 3 with 16 threads belonging to the AMD Cezanne APU lineup.
To see if the performance improvements also hold upon other Zen architectures, the Ryzen 5 5500U also did not escape the testing process, where there appeared to be a significant performance increase.
Reporting from Phoronix, Phoronix speculates that the noted performance gains may be due to a combination of CPU-specific optimizations:
“This improvement with Linux 5.16 was fascinating and came unexpectedly. Linux 5.16 has many new features including AMDGPU kernel driver improvements, but this Radeon Vega graphics boost came as a surprise as there wasn’t any announced optimization and the Vega graphics support at this stage is quite mature. It may also be a combination of CPU-related improvements with Linux 5.16.” Tulis Phoronix
Well, of course, this increase will be interesting for you Ryzen CPU users, but it’s not clear whether the upgrade will be present in all Ryzen series? or any other AMD series.
What do you think? comment below guys.
Via : Phoronix
Reminder, Ubuntu 21.04 (Impish Indri) Support Will End Soon
It’s no secret that the Ubuntu Linux distro is currently one of the most popular and widely used Linux distributions, especially for the general public and at home, all of this because this distribution is already quite popular for its ease of use, even though currently almost all common Linux distributions are already have the same user experience.
Now about Ubuntu, just a little bit of information, that Ubuntu 21.04 (Impish Indri) which was released in April 2021 will soon have the end of support in January 2022, in other words, there are only a few days before support is completely discontinued by Canonical.
Just like Windows, once terminated, there will be no more updates available and of course, this is quite dangerous, especially for security issues that might leak and endanger user data.
As a recommendation, if you are a user of 21.04 (Impish Indri) you can downgrade your system to version 20.04 LTS (Focal Fossa) which is the LTS version that has a very long support period, even End of Life itself until April 2030 later. Or if you don’t want to downgrade, you can wait until April 2022 where Canonical will release a new version, namely 22.04 LTS (Jammy Jellyfish).
So this brief information, hopefully useful.
How to download and install Linux Keylogger – Ubuntu Keylogger
Linux servers were very useful these days, just as it is very easy to register with Linux servers, and it is very easy to use them as well.
A Linux server is a server that is run by the Linux Open Source operating system. It offers businesses an affordable option to deliver content, applications, and services to their customers.
Since Linux is open source, users also benefit from a strong community of resources and followers. Each variation of Linux server is designed with different uses :
If you have a web server running, most likely CentOS® is running.
If your application serves thousands of users or even more, the solution you will be looking for will be designed to support this type of volumes such as Red Hat® Enterprise or Ubuntu® Server.
That would be overkill for your business needs as a turnkey Linux server would suffice for a specific purpose. The cloud infrastructure is typically Linux based.
Although we can use a Linux distribution for our server (eg Ubuntu) if we wish, Linux server distributions are slightly different from desktop distributions.
For example, server versions are usually much smaller than desktop versions for each administrator to customize to their liking, they usually do not have a graphical interface by default to save resources and have optimizations and features designed to offer the highest performance, greatest stability and the best possible security.
One of the better features of Linux is Keylogger because it helps us optimize and know what’s going on when we’re not at the computer.
You may want to know if anyone has used your computer while you were away and see what the classes were doing. How do I install a keylogger for Linux?
A keylogger is a hardware device or software that silently records every keyboard input (key) made by the user.
It can be used as a bidding tool to keep track of what you write and does not lose anything you have done or saved on your computer, but it should be noted that some bad people also use it for illegal purposes like malware spyware and sending this information to third parties.
How to install Keylogger for Linux? Step by step
Log keys is an advanced keylogger software for GNU / Linux systems only. Records all characters and function keys and stores them in a log file. It can be controlled through a Linux terminal.
Install and use Logkeys
- Open Terminal by pressing ctrl + alt + T and hit this command to install keylogs sudo apt-get install logkeys
- Then enter that Choose filename.log, this will create a file filename.log in your home directory where all keystrokes will be saved.
- You can enter any name in place of ‘filename’.
- Now enter the following command – sudo logkeys – start – output filename.log
- This starts the application and saves your keystrokes to the name of the .log file
- To view the filename.log file, you must first stop the application with the following logkeys sudo – kill command
- And finally, read the keystrokes recorded with logkeys cat filename.log
How to install LKL?
- Download the APK of LKL Linux.
- Unpack or compress the downloaded file.
- Open the terminal and the CD at location lkl.
- Now type ./configure and press ENTER to check that all the resources you need are available.
- If you get any error related to the C compiler, for example: “The C compiler cannot create the executable”.
- For a C compiler error: sudo apt install libc6-dev.
- Scribe ‘ Brand ‘ and press ENTER to compile the package.
- Scribe ‘ sudo install ‘ and press ENTER to install the program.
- Installation must be completed.
How to use it?
You can send an argument with the lkl command
- –h Support
- –JA register port 0 × 60 (keyboard)
- –b debug mode
- –k set the keymap file
- –or set the output file
- –m send logs to
- –t host name for sendmail. The default is localhost
- Example: lkl -l -k us_km -o log.file // use USA kb and put the logs in ‘log.file’
Did you manage to easily download Linux Keylogger?
How to Download, Install and Use Tor Browser in Kali Linux – Simple Tutorial
Keeping our safety while browsing the web is extremely important, so it is worth using tools that allow us to isolate the places we usually visit. This way, third-party trackers will not be able to access our browsing data or history accordingly, which will make your browsing more reliable and peaceful.
For all these reasons, we will tell you about the Tor browser, the browser par excellence that will protect you and allow you to avoid computer attacks, as well as browse thousands of pages on the Internet without revealing your identity to the public. Likewise, we will introduce you to the process of properly downloading and installing on your Kali Linux system with very simple steps.
What are the main features of the Tor Browser?
When we talk about security on our computer, there are possible threats that can put our data and all the valuable information we usually store on the system at risk. The same problem usually occurs on mobile devices as hackers are not resting in their work to interfere with our privacy.
Therefore, the main goal of the free Tor Browser is to hide your fingerprint from any kind of threat that may be presented while navigating. In this way, we guarantee good protection of our data, minimizing to a large extent the risk of information and location theft. It should also be mentioned that with this browser it is possible to enter the Deep Web.
Likewise, another of the great advantages of using this application on our computer is that it completely blocks all trackers. This means that by searching for a specific product, you will avoid finding annoying banner ads that come from all the searches performed. Furthermore, all visited websites will be deleted as soon as the browsing process is complete as the tool gets rid of cache, history and cookies.
Tutorial on how to download and install Tor Browser on Kali Linux
In this section, we show you how to properly download and install this valuable tool on your Kali Linux operating system. So that you can start enjoying all its benefits as soon as possible and effectively protect all your data.
- The first thing you should do is go to the official website of the Tor Browser and access it through the default application that you often use to surf the Internet.
- When you’re there, you’ll select the option that says Download for Linux, which you can see at the bottom through the icon representing Tor. Then you just need to select the download destination.
- To install it, you just need to access a terminal and run the following command: sudo apt-get update. Then you will put sudo apt-get install tor command and you will reply with “S” which means yes to confirm your choice correctly.
Note that these steps can only be performed in the Kali repository as in other versions the procedure does not work at all.
How do I configure my browser to appear in the main menu?
Since this effective tool allows the invisibility of the user to block the traffic of potential anonymous web servers, it is important to have it at hand in our main menu. Therefore, we will provide you with some simple recommendations so that you can configure it properly.
- Go to the main menu on your computer and select the option that says Regular Applications to be able to access the configuration options without any problems.
- Next, you need to select the New Item button, and you’ll be presented with a small window where you need to put Tor in the box that says Name.
- Later you have to go to where it says Command and from there you can access the destination folder path which says “/etc/tor-browser_en-US/start-tor-browser.desktop”.
After following these simple steps, everything is ready, now you should open a new anonymous browsing tab to enjoy all the benefits of the Tor browser, protect all your data and guarantee the highest security while browsing the web.
Microsoft Pulls Troubled Windows Server Update
SHARE The latest Patch Tuesday update which has been released previously is known to have caused many problems, including boot...
Microsoft Publishes Emergency Update For Windows Server
SHARE Microsoft has released an emergency out-of-band (OOB) update to address some of the issues caused by the Windows Update...
Former CEO: Microsoft Should Separate Windows and Office
SHARE A former Microsoft executive who was quite prominent in the 1990s had a crazy idea for the company, which...
Microsoft Releases Update KB5010791 For Windows 10 LTSC 2019
SHARE Two days ago, in addition to sending updates KB5010793 and KB5010795 for Windows 10 2004 users, and their families,...
Elon Musk Reveals Facts About Smartphones, The Twitter Universe Is Outrageous
SHARE Twitter as a community, tends to create an uproar in almost everything, even for issues that are not really...
Android 12 Now Can Turn Off 2G Network, For Device Security
SHARE Android 12 was officially launched in October 2021 and several OEMs have pushed the availability of this new mobile...
Windows 10 Build 19044.1499 Released to Release Preview Channel Contains Many Fixes
SHARE Users who are members of the Windows Insider program are treated to a build of Windows 11 in the...
Crypto: Knowing Crypto Money and How to Transaction
SHARE March 2020, when the Covid-19 pandemic first appeared in India, all sectors were affected by this virus. Of course,...
Microsoft Defender Exception List, Hackers Can Use To Skip Detection
SHARE Hackers could take advantage of a recently discovered vulnerability in the Microsoft Defender antivirus on Windows, to learn where...
Microsoft Confirms VPN Bug Caused By January Cumulative Update
SHARE Microsoft has finally confirmed a bug impacting VPNs caused by an update they rolled out as part of the...
- Beauty and Personal Care
- Blog Tutorials
- Home improvement
- Life Hack
- Mobile Tutorials
- MS Excel
- MS Outlook
- MS Word
- PC Tutorials
- PDF Tutorials
- Social Media
- Weight and body image
- Windows 10
- Windows 11
- Windows 11 SE
Phones2 years ago
Apple iPhone 11 (2019) – Release, Info, Leaks, Rumors
Phones2 years ago
Huawei New Operating System is HarmonyOS [ Officially ]
Tech2 years ago
Levi’s Bluetooth Jacket Lets You Control Your Smartphone
News3 years ago
Belle Delphine bath water – Instagram Model Sells Used Bathwater For 30$ To Their Loyal Followers