Tool Tips

BleachBit 1.6

Decluttering systems

Source: http://bleachbit.sourceforge.net

License: GPLv3

Alternatives: None

BleachBit deletes temporary files from more than 100 applications. Most of them may provide their own functions for cleaning up, but the Python program collects them in a central interface. This professional cleaner works in KDE, Gnome, and Xfce and is also available for Windows on download sites.

BleachBit cleans up the data from browsers, office suites, media players, chat clients, and the graphical user interface itself. The tool even clears up at a system level – it needs root privileges for this – and deletes language packs (locales), rotating logs, and temporary files that are no longer needed. If desired, it will also clean up swap and free memory. In doing so, it also removes data that is still in shared memory. A few years ago, this led to problems and program crashes in KDE, which is why some KDE users advise against using BleachBit.

In configuration, users can determine which data they want to delete by clicking checkboxes. Detailed explanations about the actions are provided on the right-hand side of the window. The tool provides a command-line interface for automating or integration with your own scripts, and it is possible to integrate your own cleaning modules; the configuration uses XML files.

4 Stars BleachBit reliably cleans disks. Users should thoroughly test their configuration before use on production systems.

fehashmac 1.4.2

Collection of hash algorithms

Source: http://sourceforge.net/projects/fehashmac

License: GPLv3

Alternatives: Hashrat, RHash

Hash algorithms for calculating checksums are ubiquitous in IT; most algorithms provide their own tools for calculating the values. Fehashmac has almost 50 hash algorithms and checksums and integrates them into a single command-line tool. These include not only classics such as MD4 and MD5, but also modern variants such as SHA1, SHA512, Tiger2, and SHA3.

The tool also provides multiple variants from each family of algorithms. In the command line, users can determine the desired algorithm with the -a parameter. Fehashmac creates a separate command for each algorithm during installation to make life easier for users. These are symbolic links that point to the fehashmac binary. Therefore, it's sufficient to invoke the respective command together with the file or text line when computing a checksum. Anyone wanting to verify checksums with all algorithms for a file should define this at startup using -a all. Further options state the key values or messages as hexadecimal strings. The tool does not have a man page, meaning that users have to search for information in the complex online help.

3 Stars Fehashmac is a veritable Swiss army knife when it comes to calculating checksums and hash algorithms. The tool requires a bit of familiarization, and the missing manual makes life difficult for newcomers.

Sshguard 1.5

Secures SSH ports

Source: http://www.sshguard.net

License: BSD

Alternatives: Fail2ban

With Sshguard, you can protect your SSH service against intrusion attempts. The tool cooperates well with common firewall solutions such as iptables, Netfilter, PF, IPFW, and IPFilter and even blocks intruders when establishing a connection. Sshguard evaluates logfiles to identify attackers. Users specify the protocol at startup using the -l option.

By default, the tool blocks IPs that have misbehaved more than 40 times; that is, connections that match specific attack signatures. The monitoring tool is familiar with 15 attacks altogether – most relate to SSH but includes attacks on Dovecot, Sendmail, vsftp, ProFTP, and Exim services as well. If a remote computer has exceeded the limit, Sshguard blocks its address for seven minutes by default. You can specify addresses or whole domains for Sshguard to exclude with the -w option.

Anyone wanting to make sure particularly stubborn attackers are blocked forever can do so by setting a limit and a blacklist with -b. This is where Sshguard stores the addresses for computers you want to lock out permanently. To remove an IP from this list, users can edit the list in a text editor.

5 Stars The Sshguard log monitor reliably prevents intrusion attempts. The tools works well with common firewall solutions and now also supports other services. The documentation on the website helps with setup.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Keep Your System Clean with BleachBit
  • BleachBit

    Many Linux services and applications create a continuous log of their activities. BleachBit cleans up the resulting log files conveniently and efficiently.

  • Privacy Tools

    Maybe you can't stop the NSA, but you can still take meaningful steps to protect your privacy.

  • Clean System

    Linux and many Internet services just love logging. To keep your system from putting on too much weight and wasting valuable disk space, we present an effective diet with guaranteed success.

  • Disk Cleaners

    You wouldn’t believe how much of the disk space on your system is wasted, filled with duplicate files, or cruft you don’t need.

comments powered by Disqus

Direct Download

Read full article as PDF:

Price $2.95

News