<?xml version="1.0" encoding="utf-8"?>
<!-- generator="Kirby" -->
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">

  <channel>
  <title>The Linux Rain</title>
    <link>https://www.thelinuxrain.org/blog</link>
    <generator>Kirby</generator>
    <lastBuildDate>Thu, 07 Apr 2022 02:48:52 +0000</lastBuildDate>
    <atom:link href="https://www.thelinuxrain.org" rel="self" type="application/rss+xml" />

        <description>Read the latest articles from The Linux Rain</description>
    
        <item>
      <title>mkws - Static Site Generation With The Shell</title>
      <link>https://www.thelinuxrain.org/articles/mkws-static-site-generation-with-the-shell</link>
      <guid>articles/mkws-static-site-generation-with-the-shell</guid>
      <pubDate>Wed, 17 Feb 2021 12:30:00 +0000</pubDate>
      <description><![CDATA[Today I'm looking at something a little different. Rarely (or ever?) do I take a look at static website generators on here, but mkws is a bit of a special case.]]></description>
    </item>
        <item>
      <title>Geolocation using Python</title>
      <link>https://www.thelinuxrain.org/articles/geolocation-using-python</link>
      <guid>articles/geolocation-using-python</guid>
      <pubDate>Tue, 09 Feb 2021 14:00:00 +0000</pubDate>
      <description><![CDATA[Geolocating is the process of retrieving location-related information about a given IP address.  And yes! It can be done using Python!  So, let’s get right to it.]]></description>
    </item>
        <item>
      <title>Python for Data Science: Data Visualization</title>
      <link>https://www.thelinuxrain.org/articles/python-for-data-science-data-visualization</link>
      <guid>articles/python-for-data-science-data-visualization</guid>
      <pubDate>Mon, 01 Feb 2021 15:00:00 +0000</pubDate>
      <description><![CDATA[Python can be used to generate from simple to very complex graphs. In this segment, we’ll learn how to graph using python.]]></description>
    </item>
        <item>
      <title>Tor Browser: Anonymity and Beyond</title>
      <link>https://www.thelinuxrain.org/articles/tor-browser-anonymity-and-beyond</link>
      <guid>articles/tor-browser-anonymity-and-beyond</guid>
      <pubDate>Thu, 21 Jan 2021 21:00:00 +0000</pubDate>
      <description><![CDATA[There are three types of web: the surface web, the deep web, and the dark web. All that you can access using your Google browser is known as the surface web - it is visible to one and all. The deep web is all information that is under lock and key. In other words, we don’t have access to it. The dark web, on the other hand, is a creepy and secret underworld where access is denied using normal browsers. But with special tools handy and ready, users can buy almost anything - from guns to atom bombs - with total anonymity. In order to access the dark web, we need a special browser capable of opening and displaying dot onion links. This is where the Tor browser comes in.]]></description>
    </item>
        <item>
      <title>The Linux Rain is Now Brave Verified &#38;#10004;</title>
      <link>https://www.thelinuxrain.org/articles/thelinuxrain-now-brave-verified</link>
      <guid>articles/thelinuxrain-now-brave-verified</guid>
      <pubDate>Tue, 19 Jan 2021 17:00:00 +0000</pubDate>
      <description><![CDATA[For those of you using the Brave web browser, I'm pleased to report we The Linux Rain are now Brave Verified.]]></description>
    </item>
        <item>
      <title>Security Auditing Tools For Ubuntu</title>
      <link>https://www.thelinuxrain.org/articles/security-auditing-tools-for-ubuntu</link>
      <guid>articles/security-auditing-tools-for-ubuntu</guid>
      <pubDate>Mon, 18 Jan 2021 16:00:00 +0000</pubDate>
      <description><![CDATA[Malware, where aren’t thou found? Well, even our wonderful Ubuntu can be infected. So what can we do about it? Hope and pray we keep our system safe and better yet, audit our systems regularly for malwares and rootkits. There are 4 system auditors for Ubuntu that we will review - lynis, rkhunter, chkrootkit, and clamav.]]></description>
    </item>
        <item>
      <title>Hacking WPA2 WiFi Networks</title>
      <link>https://www.thelinuxrain.org/articles/hacking-wpa2-wifi-networks</link>
      <guid>articles/hacking-wpa2-wifi-networks</guid>
      <pubDate>Mon, 09 Nov 2020 13:00:00 +0000</pubDate>
      <description><![CDATA[Whatever the reason for wanting to hack a wifi network, it is nonetheless doable. In fact, it’s become childs play these days.]]></description>
    </item>
        <item>
      <title>Sending an Email Using Python</title>
      <link>https://www.thelinuxrain.org/articles/sending-email-using-python</link>
      <guid>articles/sending-email-using-python</guid>
      <pubDate>Thu, 15 Oct 2020 15:00:00 +0000</pubDate>
      <description><![CDATA[Ever wanted to send emails using just Python? A few lines of code and you don’t even need to log into your Gmail account to email anyone in the world. In fact, you can do this in your terminal]]></description>
    </item>
        <item>
      <title>How to Set systemd to Hibernate Instead of Suspend on Laptop Lid Close</title>
      <link>https://www.thelinuxrain.org/articles/how-to-set-systemd-to-hibernate-instead-of-suspend-on-laptop-lid-close</link>
      <guid>articles/how-to-set-systemd-to-hibernate-instead-of-suspend-on-laptop-lid-close</guid>
      <pubDate>Sun, 04 Oct 2020 19:00:00 +0000</pubDate>
      <description><![CDATA[In this article we'll be seeing how to change the setting that sets how systemd (the most common init system on GNU/Linux systems) handles lid closes. By default, when you close the lid on your laptop it will in most cases suspend (sleep). What if you wish to for the system to hibernate instead? It's quite easy to change.]]></description>
    </item>
        <item>
      <title>SSH Tunneling</title>
      <link>https://www.thelinuxrain.org/articles/ssh-tunneling</link>
      <guid>articles/ssh-tunneling</guid>
      <pubDate>Mon, 22 Jun 2020 18:00:00 +0000</pubDate>
      <description><![CDATA[In SSH tunneling, an encrypted channel is created between an ssh client and an ssh server. Information flowing within the encrypted tunnel is secure and thus cannot be intercepted. This type of service is in particular used when running insecure protocols such as TightVNC. They can also be used to access internal networks and services running on them, bypass firewalls, as VPNs and as backdoors.]]></description>
    </item>
    
  </channel>
</rss>
