Automated Malware Analysis Report for Rclone.Exe

Total Page:16

File Type:pdf, Size:1020Kb

Automated Malware Analysis Report for Rclone.Exe ID: 280239 Sample Name: rclone.exe Cookbook: default.jbs Time: 17:01:58 Date: 31/08/2020 Version: 29.0.0 Ocean Jasper Table of Contents Table of Contents 2 Analysis Report rclone.exe 4 Overview 4 General Information 4 Detection 4 Signatures 4 Classification 4 Startup 5 Malware Configuration 5 Yara Overview 5 Sigma Overview 5 Signature Overview 6 Mitre Att&ck Matrix 6 Behavior Graph 6 Screenshots 7 Thumbnails 7 Antivirus, Machine Learning and Genetic Malware Detection 8 Initial Sample 8 Dropped Files 8 Unpacked PE Files 8 Domains 8 URLs 8 Domains and IPs 9 Contacted Domains 9 URLs from Memory and Binaries 9 Contacted IPs 12 General Information 12 Simulations 13 Behavior and APIs 13 Joe Sandbox View / Context 13 IPs 13 Domains 13 ASN 13 JA3 Fingerprints 13 Dropped Files 13 Created / dropped Files 13 Static File Info 13 General 13 File Icon 14 Static PE Info 14 General 14 Entrypoint Preview 14 Data Directories 15 Sections 16 Imports 17 Network Behavior 18 Code Manipulations 18 Statistics 18 Behavior 18 System Behavior 18 Analysis Process: rclone.exe PID: 6480 Parent PID: 5876 18 General 18 File Activities 19 File Created 19 Analysis Process: conhost.exe PID: 6916 Parent PID: 6480 19 General 19 Copyright null 2020 Page 2 of 19 Disassembly 19 Code Analysis 19 Copyright null 2020 Page 3 of 19 Analysis Report rclone.exe Overview General Information Detection Signatures Classification Sample rclone.exe Name: PPEE fffiiilllee ccoonntttaaiiinnss aann iiinnvvaallliiidd cchheecckkssuum Analysis ID: 280239 PPEE fffiiilllee ccoonntttaaiiinnss sasenec cittntiiioovnanslsi d ww ciiittthhe nncokonsn-u--ssm… MD5: 2a17c6da652cffd… SPSaEam fiplpellle ec eoexnxeteacciunuttstiiio osnne scstttoiooppnsss w whhitiiilhllee n pporrronoc-csee… SHA1: 2dd2b0caf193a21… SSaampplllee ffefiiillxleee iicissu ddtiiioiffffffnee rrrseetnonttpt ttsthh awannh ioloerrri iigpgiirinnoaacllel … SHA256: efbc7ccee3c7641… USUsasemessp clceoo dfdielee o oisbb fffduuisfsfcceaartettiiionontn t thtteeaccnhh noniiriqqiguuienesas l(( (… Most interesting Screenshot: Uses code obfuscation techniques ( Score: 2 Range: 0 - 100 Whitelisted: false Confidence: 80% Copyright null 2020 Page 4 of 19 Ransomware Miner Spreading mmaallliiiccciiioouusss malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious cccllleeaann clean Exploiter Banker Spyware Trojan / Bot Adware Startup System is w10x64 rclone.exe (PID: 6480 cmdline: 'C:\Users\user\Desktop\rclone.exe' MD5: 2A17C6DA652CFFDF8E127FBFF8A2DBA4) conhost.exe (PID: 6916 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) cleanup Malware Configuration No configs have been found Yara Overview No yara matches Sigma Overview No Sigma rule has matched Copyright null 2020 Page 5 of 19 Signature Overview • Networking • System Summary • Data Obfuscation • Hooking and other Techniques for Hiding and Protection • Malware Analysis System Evasion • Language, Device and Operating System Detection Click to jump to signature section There are no malicious signatures, click here to show all signatures . Mitre Att&ck Matrix Remote Initial Privilege Defense Credential Lateral Command Network Service Access Execution Persistence Escalation Evasion Access Discovery Movement Collection Exfiltration and Control Effects Effects Impact Valid Command Path Process Masquerading 1 OS Security Remote Data from Exfiltration Data Eavesdrop on Remotely Modify Accounts and Scripting Interception Injection 1 Credential Software Services Local Over Other Obfuscation Insecure Track Device System Interpreter 2 Dumping Discovery 1 System Network Network Without Partition Medium Communication Authorization Default Scheduled Boot or Boot or Process LSASS Process Remote Data from Exfiltration Junk Data Exploit SS7 to Remotely Device Accounts Task/Job Logon Logon Injection 1 Memory Discovery 1 Desktop Removable Over Redirect Phone Wipe Data Lockout Initialization Initialization Protocol Media Bluetooth Calls/SMS Without Scripts Scripts Authorization Domain At (Linux) Logon Script Logon Obfuscated Files Security System SMB/Windows Data from Automated Steganography Exploit SS7 to Obtain Delete Accounts (Windows) Script or Information 1 Account Information Admin Shares Network Exfiltration Track Device Device Device (Windows) Manager Discovery 2 Shared Location Cloud Data Drive Backups Behavior Graph Copyright null 2020 Page 6 of 19 Hide Legend Legend: Process Signature Created File Behavior Graph DNS/IP Info ID: 280239 Is Dropped Sample: rclone.exe Is Windows Process Startdate: 31/08/2020 Number of created Registry Values Architecture: WINDOWS Number of created Files Score: 2 Visual Basic Delphi started Java .Net C# or VB.NET rclone.exe C, C++ or other language Is malicious 3 Internet started conhost.exe Screenshots Thumbnails This section contains all screenshots as thumbnails, including those not shown in the slideshow. Copyright null 2020 Page 7 of 19 Antivirus, Machine Learning and Genetic Malware Detection Initial Sample Source Detection Scanner Label Link rclone.exe 0% Virustotal Browse rclone.exe 2% ReversingLabs Dropped Files No Antivirus matches Unpacked PE Files No Antivirus matches Domains No Antivirus matches URLs Source Detection Scanner Label Link 127.0.0.1:53682/auth?state=https://api.hubic.com/oauth/token/https://oauth.yandex.com/authori 0% Avira URL Cloud safe https://api%s/1/oauth2/tokenhttps://upload.put.io/files/https://www.amazon.com/ap/oaiam.us-iso- 0% Avira URL Cloud safe east- Copyright null 2020 Page 8 of 19 Source Detection Scanner Label Link ftp://.usr.uvu--AZ 0% Avira URL Cloud safe nextcloud.org/ns 0% Virustotal Browse nextcloud.org/ns 0% Avira URL Cloud safe https://meta.dropboxapi.com 0% Avira URL Cloud safe https://api.dropboxapi.com/1/oauth2/token 0% Virustotal Browse https://api.dropboxapi.com/1/oauth2/token 0% Avira URL Cloud safe https://meta.dropboxapi.com/1/oauth2/authorize 0% Avira URL Cloud safe https://restic.net/) 0% Avira URL Cloud safe www.secfs.net/winfsp/). 0% Avira URL Cloud safe 169.254.170.2if/with 0% Avira URL Cloud safe https://app.koofr.nethttps://cloud.mail.ruhttps://upload.put.ioifMetagenerationMatchin 0% Avira URL Cloud safe https://%s.%sif-none-matchignore-errorsimage/svg 0% Avira URL Cloud safe 0% Avira URL Cloud safe https://meta.dropboxapi.com/1/oauth2/authorizehttps://api.dropboxapi.com/1/oauth2/tokenfRS5vVLr2v6F b https://qingstor.com:443 4% Virustotal Browse https://qingstor.com:443 0% Avira URL Cloud safe Domains and IPs Contacted Domains No contacted domains info URLs from Memory and Binaries Name Source Malicious Antivirus Detection Reputation 127.0.0.1:53682/auth? rclone.exe, 00000001.00000000. false Avira URL Cloud: safe unknown state=https://api.hubic.com/oauth/token/https://oauth.yandex.c 224032685.0000000001534000.000 om/authori 00002.00020000.sdmp https://github.com/rclone/rclone/issues/2206)) rclone.exe, 00000001.00000000. false high 224032685.0000000001534000.000 00002.00020000.sdmp rclone.exe, 00000001.00000000. false Avira URL Cloud: safe low https://api%s/1/oauth2/tokenhttps://upload.put.io/files/https://w 224032685.0000000001534000.000 ww.amazon.com/ap/oaiam.us-iso-east- 00002.00020000.sdmp rclone.exe, 00000001.00000000. false high https://beta.rclone.org/https://g.api.mega.co.nzhttps://o2.mail.r 224032685.0000000001534000.000 u/tokeniam.us-gov.amazonaws.comidna 00002.00020000.sdmp https://github.com/billziss-gh/cgofuse). rclone.exe, 00000001.00000002. false high 272641782.000000C0005D2000.000 00004.00000001.sdmp https://1fichier.com/console/params.pl rclone.exe, 00000001.00000000. false high 224032685.0000000001534000.000 00002.00020000.sdmp https://docs.aws.amazon.com/AmazonS3/latest/dev/acl- rclone.exe, 00000001.00000000. false high overview.html#canned-acl 224032685.0000000001534000.000 00002.00020000.sdmp https://nssm.cc/usage). rclone.exe, 00000001.00000002. false high 272641782.000000C0005D2000.000 00004.00000001.sdmp schemas.xmlsoap.org/soap/envelope/ rclone.exe false high https://beta.rclone.org/v1.42-005-g56e1e820 rclone.exe, 00000001.00000000. false high 224032685.0000000001534000.000 00002.00020000.sdmp rclone.exe, 00000001.00000000. false high https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingBuc 224032685.0000000001534000.000 ket.html#access-bucket-intro) 00002.00020000.sdmp s3.amazonaws.com/doc/2006-03-01/ rclone.exe, 00000001.00000000. false high 224032685.0000000001534000.000 00002.00020000.sdmp schemas.xmlsoap.org/ws/2005/02/trust rclone.exe, 00000001.00000000. false high 224032685.0000000001534000.000 00002.00020000.sdmp rclone.exe, 00000001.00000000. false high https://auth.cloud.ovh.net/v3https://cloud.mail.ru/public/https:// 224032685.0000000001534000.000 downloads.rclone.org/https://user: 00002.00020000.sdmp rclone.exe, 00000001.00000000. false high https://docs.aws.amazon.com/AmazonS3/latest/dev/transfer- 224032685.0000000001534000.000 acceleration-examples.html)Don 00002.00020000.sdmp Copyright null 2020 Page 9 of 19 Name Source Malicious Antivirus Detection Reputation https://golang.org/pkg/runtime/#MemStats rclone.exe, 00000001.00000000. false high 224032685.0000000001534000.000 00002.00020000.sdmp https://app.koofr.net/app/admin/preferences/password) rclone.exe, rclone.exe, 000000 false high 01.00000003.243787407.000000C0 003EE000.00000004.00000001.sdmp, rclone.exe, 00000001.000000 00.224032685.0000000001534000. 00000002.00020000.sdmp rclone.exe, 00000001.00000000. false high https://www.backblaze.com/b2/docs/integration_checklist.html) 224032685.0000000001534000.000 .Don 00002.00020000.sdmp rclone.exe, 00000001.00000000.
Recommended publications
  • El-Arte-De-La-Linea-De-Comandos
    Traducido por Lyx Drymer Maxxcan Zorro Fanta Suggie y Frangor de El Binario 2 Indice´ general 0.1. El arte de la l´ınea de comandos . .4 0.1.1. Meta . .4 0.1.2. Fundamentos . .5 0.1.3. De uso diario . .6 0.1.4. Procesamiento de archivos y datos . .8 0.1.5. Depuracion´ del sistema . 10 0.1.6. Comandos concatenados . 11 0.1.7. Oscuro pero util´ . 13 0.1.8. Solo MacOS . 15 0.1.9. Mas´ recursos . 16 0.1.10. Advertencia . 16 0.1.11. Licencia . 16 3 4 INDICE´ GENERAL 0.1. El arte de la lınea´ de comandos La soltura del uso de la consola es una destreza a menudo abandonada y considerada arcaica, pero mejorara´ tu flexibilidad y productividad como si fueras un i ngeniero de una forma obvia y sutil. Esta es una seleccion´ de notas y consejos de como usar la l´ınea de comandos de consola que encontre´ util´ cuando trabajaba en Linux. Algunos consejos son basicos,´ y otros bastante espec´ıficos, sofiscitados, u .oscuros”. Esta pagina´ no es larga, pero si usas y recuerdas todos los puntos, sabras´ lo suficiente. Figura 1: curl -s ‘https://raw.githubusercontent.com/jlevy/the-art-of-command- line/master/README.md’q j egrep -o ‘nw+’ j tr -d “’ j cowsay -W50 0.1.1. Meta Objetivo: Esta gu´ıa es tanto para el principiante como para el experimentado. Los objeti- vos son amplitud (todo importa), especificidad (dar ejemplos concretos del uso mas´ comun),´ y brevedad (evitar lo que no sea esencial o que se puedan encontrar facil-´ mente en otro lugar).
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • A Slim and Trim Linux System for You !
    A slim and trim Linux system for you ! S. Parthasarathy [email protected] ncdubuntu.odt 2018-08-12a A stitch in time … You just created a shiny new Linux system with all the bells and whistles ? Happy to see your new babe giggle and dance, as you play with her ? You want it to be the same way all the time ? It is important to do some house-keeping once a while. Over time, a computer system tends to get cluttered for many reasons. For example, software packages that are no longer needed can be uninstalled. When the system is upgraded from release to release, it may miss out on configuration tweaks that freshly installed systems get. Updating your system through the default updating tool will gradually cause the accumulation of packages and the filling of the cache. This can have a larger impact when you're uninstalling software packages and their dependencies are left behind for no reason. Over the time, you could have a dozen copies of the same file lying in different corners of your system. The best place is to hunt them down and eliminate them before they take control of the hard disk. Occasional mishaps, like unexpected disk crashes, or unintentional power failures may leave your disk with a lot of inaccessible fragments. A badly configured application may quietly chew up your disk, till there is no more free space left. Or, a runaway process or shell script may keep filling up your disk over and over again. The result could be a dramatic lockout for you.
    [Show full text]
  • Design and Implementation of a Compressed Linked List Library
    Design and implementation of a compressed linked list library Yoran Heling Design and implementation of a compressed linked list library Final project Company supervisor: Author: University supervisor: Anton Prins Yoran Heling Gerard Nanninga D&R Elektronica Hanze University Groningen June 2, 2010 Preface This report is written as part of my final project during the Electrical Engineering course at the Hanze University Groningen, and represents the research and findings from the project Implementation and design of a compressed linked list library. This project is commissioned by D&R Electronics. This report is targeted at people with an interest in compression techniques and digital data processing, and for software engineers working with applications that handle large amounts of data in application memory. Basic knowledge in the fields of computer architecture and software design is required in order to fully understand the topics being discussed in this report. I would like to thank ing. A. Prins of D&R Electronics and ir. G.J. Nanninga of the Hanze University of Groningen for their constructive feedback and continued supervision during this project. Gieten, June 2010. I Contents 1 Introduction 1 1.1 Introduction . .1 1.2 Problem specification . .1 1.3 Plan of action . .2 2 Introduction to compression 4 2.1 Delta coding . .4 2.2 Run-length encoding . .5 2.3 Lempel-Ziv . .5 2.4 Huffman coding . .6 2.5 Range encoding . .8 2.6 Comparison . .9 2.7 General-purpose compression libraries . .9 3 Introduction to linked lists 11 3.1 Common types of linked lists . 11 3.2 Tree data structures .
    [Show full text]
  • Linux Quick Reference Guide (8Th Ed.)
    Linux Quick Reference Guide 8th edition January 2020 Foreword This guide stems from the notes I have been taking while studying and working as a Linux sysadmin and engineer. It contains useful information about standards and tools for Linux system administration, as well as a good amount of topics from the certification exams LPIC-1 (Linux Professional Institute Certification level 1), LPIC-2, RHCSA (Red Hat Certified System Administrator), and RHCE (Red Hat Certified Engineer). Unless otherwise specified, the shell of reference is Bash. This is an independent publication and is not affiliated with LPI or Red Hat. You can freely use and share the whole guide or the single pages, provided that you distribute them unmodified and not for profit. This document has been composed with Apache OpenOffice. Happy Linux hacking, Daniele Raffo Version history 1st edition May 2013 2nd edition September 2014 3rd edition July 2015 4th edition June 2016 5th edition September 2017 6th edition August 2018 7th edition May 2019 8th edition January 2020 Bibliography and suggested readings ● Evi Nemeth et al., UNIX and Linux System Administration Handbook, O'Reilly ● Rebecca Thomas et al., Advanced Programmer's Guide to Unix System V, McGraw-Hill ● Mendel Cooper, Advanced Bash-Scripting Guide, http://tldp.org/LDP/abs/html ● Adam Haeder et al., LPI Linux Certification in a Nutshell, O'Reilly ● Heinrich W. Klöpping et al., The LPIC-2 Exam Prep, http://lpic2.unix.nl ● Michael Jang, RHCSA/RHCE Red Hat Linux Certification Study Guide, McGraw-Hill ● Asghar Ghori, RHCSA & RHCE RHEL 7: Training and Exam Preparation Guide, Lightning Source Inc.
    [Show full text]
  • Creating a Bootable Ubuntu Server Flash Drive (Linux)
    |||||||||||||||||||| |||||||||||||||||||| |||||||||||||||||||| Mastering Ubuntu Server Get up to date with the finer points of Ubuntu Server using this comprehensive guide Jay LaCroix BIRMINGHAM - MUMBAI |||||||||||||||||||| |||||||||||||||||||| Mastering Ubuntu Server Copyright © 2016 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. First published: July 2016 Production reference: 1210716 Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK. ISBN 978-1-78528-452-6 www.packtpub.com |||||||||||||||||||| |||||||||||||||||||| Credits Author Project Coordinator Jay LaCroix Kinjal Bari Reviewers Proofreader David Diperna Safis Editing Robert Stolk Indexer Acquisition Editor Hemangini Bari Prachi Bisht Graphics Content Development Editor Kirk D'Penha Trusha Shriyan Production Coordinator Technical Editor Shantanu N. Zagade Vishal K. Mewada Cover Work Copy Editor Shantanu N. Zagade Madhusudan Uchil |||||||||||||||||||| |||||||||||||||||||| About the Author Jay LaCroix is an open-source enthusiast, specializing in Linux.
    [Show full text]
  • H2-For-The-Arts Documentation Release 2020 Raffaella D'auria
    H2-for-the-Arts Documentation Release 2020 Raffaella D’Auria Apr 22, 2020 Using the Hoffman2 cluster: 1 Connecting/Logging in 3 1.1 Connecting via a terminal........................................3 1.2 Connecting via NX clients........................................6 2 Unix command line 101 11 2.1 Navigation................................................ 11 2.2 Environmental variables......................................... 13 2.3 Working with files............................................ 14 2.4 Miscellaneous commands........................................ 15 3 Data transfer 17 3.1 Data transfer nodes............................................ 17 3.2 Tools................................................... 17 3.3 Cloud storage services.......................................... 18 3.4 Globus.................................................. 19 3.5 rclone................................................... 22 3.6 scp.................................................... 35 3.7 sftp.................................................... 36 3.8 rsync................................................... 37 4 Rendering 39 4.1 Getting an interactive-session...................................... 39 4.2 Submitting batch jobs.......................................... 44 4.3 GPU-access................................................ 49 5 Indices and tables 51 i ii H2-for-the-Arts Documentation, Release 2020 This page will guide you on how to get started on H2. How-to use this documentation Please use the table of contents contained in the menu to
    [Show full text]
  • Master Branch of Your Git Working Copies of the Different Easybuild Repositories
    EasyBuild Documentation Release 20201210.0 Ghent University Wed, 06 Jan 2021 10:34:03 Contents 1 What is EasyBuild? 3 2 Concepts and terminology 5 2.1 EasyBuild framework..........................................5 2.2 Easyblocks................................................6 2.3 Toolchains................................................7 2.3.1 system toolchain.......................................7 2.3.2 dummy toolchain (DEPRECATED) ..............................7 2.3.3 Common toolchains.......................................7 2.4 Easyconfig files..............................................7 2.5 Extensions................................................8 3 Typical workflow example: building and installing WRF9 3.1 Searching for available easyconfigs files.................................9 3.2 Getting an overview of planned installations.............................. 10 3.3 Installing a software stack........................................ 11 4 Getting started 13 4.1 Installing EasyBuild........................................... 13 4.1.1 Requirements.......................................... 14 4.1.2 Bootstrapping EasyBuild.................................... 14 4.1.3 Advanced bootstrapping options................................ 18 4.1.4 Updating an existing EasyBuild installation.......................... 20 4.1.5 Dependencies.......................................... 20 4.1.6 Sources............................................. 23 4.1.7 In case of installation issues. .................................. 23 4.2 Configuring EasyBuild.........................................
    [Show full text]
  • Les Cahiers Du Débutant
    Les cahiers du débutant sans se prendre la tête avec Debian F acile mise à jour : 1 août 2016 Document sous licence libre GPLv3 – équipe Debian-Facile D ebian ? Késako ? page 4 Les valeurs Debian page 6 Déterminez votre niveau page 9 Initiation Simplifiée à L’informatique page 10 Choisir sa Debian page 37 Installez Debian page 56 Démarrage rapide, prise en main page 91 Configuration détaillée page 127 Administration simplifiée page 144 DFLinux, vos ISOs simplifiées page 168 Alle z plus loin page 170 Glossaire simplifié page 187 Annuaire du Libre page 220 Annexes page 231 Sommaire détaillée page 239 – À propos de ce manuel – « Les cahiers du débutant » est un manuel simplifié francophone pour l'installation et la prise en main d'un système Debian. Vous trouverez dans ces pages les réponses à vos premières questions sur le système Debian GNU/Linux ; son histoire, son obtention, son installation, sa prise en main, sa configuration et son administration. Vous pourrez aller plus loin et en apprendre plus sur la protection de la vie privée, la sauvegarde de vos données ou les différents organes du monde Libre français. Ce manuel n'est pas exhaustif et n'en a pas la mission : Pour une documentation détaillée, visitez le wiki Debian-Facile. Si vous désirez un manuel complet Debian, consultez les Cahiers de l'admin de Raphaël Hertzog et Roland Mas https://debian-handbook.info/browse/fr-FR/stable/. – L’équipe Debian-Facile – Page principale : https:// debian-facile .org Forum d’entraide : https:// debian-facile.org/forum.php Documentation officielle : http s :// debian-facile .org/ wiki Portail de l’Association : https://debian-facile.org/asso.php Manuel en cours de relecture , visitez la page du projet : https://debian-facile.org/projets:ebook-facile Index – Les cahiers du débutant – Sommaire 3 1 - Debian ? Kézako ? Debian (prononcez Dé-biane) est un système d'exploitation ( OS = Operating System = Système d’Exploitation) libre, gratuit, et alternatif aux systèmes propriétaires et payants (Windows™ ou Apple™).
    [Show full text]
  • BLOATED DATA I’Ve Never Heard of an Admin Having to Remove Disks from a Server Because of a Chronic Lack of Data, but Full Disks Are Part of the Daily Grind
    Schlagwort sollteCharly’s hier Column stehen COVERSYSADMIN STORY The sys admin’s daily grind: ncdu BLOATED DATA I’ve never heard of an admin having to remove disks from a server because of a chronic lack of data, but full disks are part of the daily grind. The du clone ncdu will help slim down your data. BY CHARLY KÜHNAST use Nagios to keep track of hard- disk capacity on my server disks. IWhenever the successor to NetSaint kindly informs me that the remaining disk capacity on server XY has dropped below the magical threshold of 10%, I may be warned, but the trouble is just starting. If I’m out of luck, the whole data repository could reside on a RAID system without anything in the line of partitioning, and believe me, this is fairly typical for smaller servers. With a bit more luck, Nagios [1] might tell me that the /var partition is the bot- tleneck, leaving me to launch du and find out where the disk hogs have their megabytes stashed. Unfortunately, out- put from the Disk Usage tool for overly Figure 1: Ncdu is what du should be – it gives the user hotkeys to navigate directories and to complicated directory trees, like the ones modify the sorting order. I have, is less than intuitive. Enter NCurses [2], a knight in shining enables alphabetical sorting in reverse bills itself as a “diff-capable du browser,” armor with a mission to chop a few order. At times, directories can seem in- tdu, which Heling refers to as “another heads off the Hydra known as Disk nocuous because ncdu displays a couple small ncurses-based disk visualization Usage.
    [Show full text]
  • Muuglines the Manitoba UNIX User Group Newsletter
    MUUGLines The Manitoba UNIX User Group Newsletter Volume 33 No. 8, April 2021 Editor: Katherine Scrupa Next Meeting: April 13th, 2021 ,is month (0ust like last month+ we are using our (Online Jitsi Video Meeting) own online Jitsi meeting server hosted by merlin.mb.ca . The virtual meeting room will be Calibre eBook Reader – Chris Audet open around 7&22 pm on April 14th, with the actual meeting starting at 7&42 pm You do not need to Do you love to read, but your house is running out install any special app or so5ware to use Jitsi& you of space for books? Does your family poke fun at can use it via any modern webcam%enabled browser your messy ebook hoarding habits? Take back by going to the aforementioned link No camera? control of your library – this month Chris Audet will $oin without, or use your phone with the Android or present an overview of Calibre, the world’s best i7. app- Thank you MERLIN (the Manitoba Education ebook management program 9esearch and Learning Information Networks+ for providing the hosting and bandwidth for our Calibre can meetings automatically organi!e books The latest meeting details are always at: by author, series, etc You can read https://muug.ca/meetings/ directly in Calibre, or Calibre &l$gins convert your books to use a dedicated device like a Kindle You To complement this month’s meeting, check out all can even share your library over the web for your the Calibre Plugins- E<amples includes accessibility friends and family plugins, page generators for Amazon forma=ing, downloaders for metadata and covers from large $oin us for a brief overview of Calibre’s history and booksellers and Goodreads, spli=ing tools, merging features, and why you might choose to use it to tools, library codes? manage your collection.
    [Show full text]
  • Ubuntu Server Check Free Disk Space
    Ubuntu server check free disk space The first is to use df - which according to the Ubuntu Manpage: df - report file system disk space usage Information on that can be found in How to determine where the biggest files/directories on my system are stored? The su command is completely irrelevant. The disk usage is the same for all users. Anyway, some relevant commands and their output on my. Yes, df -h (Disk Free) will show the free space on each of the mounted file Note: It's also worth running df -i to check the you haven't run out of. To check free space on a given disk/volume: Open the Disks application from the Dash. In the left pane select the disk that you want to check. In the right pane. As a system administrator, I operate a few hundred Linux servers and most of This is the most basic command of all; df can display free disk space. -x tells du to only check this file system (makes the command run faster). Your browser does not currently recognize any of the video formats available. Click here to visit our frequently. When you need to free up space on Ubuntu here are 5 simple things you can do Unlike Windows, with its built-in defrag and disk clean-up tools, Ubuntu doesn't make it immediately Run it as root, and check the boxes besides the parts you'd like to clean. This happens when you inherit over a server. In Linux, you can check disk space using command line tool called df command.
    [Show full text]