How to Install an Nginx RTMP Server in Ubuntu 22.04

nginx rtmp splash

In this tutorial, you will learn how to install the Nginx web server and enable the RTMP (Real-Time Messaging Protocol) module on any Ubuntu-based distribution. The RTMP protocol is a robust and efficient means of transmitting live video streams from your computer to the internet. This makes it an indispensable tool for content creators and streamers. With this tutorial, you can master the installation and configuration of Nginx with the RTMP module. This will allow you to broadcast your live video streams with ease.

Nginx is an open-source web server that is known for its efficiency, scalability, and reliability. It is widely used by web developers and system administrators to serve dynamic web content, reverse proxy, load balance, and cache HTTP requests. The Nginx RTMP module supports live streaming, making it an all-in-one solution for web developers and content creators.

RTMP is widely used by video streaming services such as YouTube, Twitch, and Facebook Live. With Nginx and the RTMP module, you can create your own video streaming service or broadcast your content on existing platforms. Whether you are a web developer looking to add live streaming to your website or a content creator looking to broadcast your content to a global audience. This tutorial is an excellent starting point to get you up and running with Nginx and the RTMP module.

Update and Upgrade Ubuntu

update and upgrade ubuntu

The first thing you will need to do is update and upgrade Ubuntu. You can do this with the following apt command.

sudo apt update && sudo apt upgrade

Install Nginx Web Server

install nginx web server

Next install nginx using apt.

sudo apt install nginx

Enable the Ubuntu Universe Repository

enable universal repository

We will now need to enable the Ubuntu Universe Repository. It is usually enabled by default but it is a good idea to verify. This will allow us to install the Nginx rtmp module.

sudo add-apt-repository universe

Install the Nginx RTMP Module

install nginx rtmp module

After you have enabled the repository, install the Nginx RTMP module using the command below. This will allow us to stream RTMP video using the Nginx web server.

sudo apt install libnginx-mod-rtmp

Open the Nginx Config File

open nginx config

Now we will need to make a few configuration changes in the nginx config file. Open it using the nano text editor.

sudo nano /etc/nginx/nginx.conf

Add Lines to Config

edit nginx config

Once you have opened the config file, scroll to the bottom and add the following lines. After adding them, save and close the file.

rtmp {
	server {
		listen 1935;
		chunk_size 4096;

		application live {
			live on;
			record off;
		}
	}
}

Restart Nginx Web Server

restart nginx

The last step of the installation process is to restart Nginx. Do this using the following systemctl command.

sudo systemctl restart nginx

Create a Test RTMP Stream with OBS

At this point we have finished the installation and configuration of a RTMP streaming server using Nginx. We now need to test the server. In this article I will be using OBS Studio to demonstrate the test stream. Below you will see instructions for installing OBS on both Windows and Linux. Choose the option that matches the OS of the system you will be streaming from.

Install OBS Studio (Ubuntu)

install obs studio ubuntu

Run the following command to install OBS Studio on Ubuntu.

sudo apt install obs-studio

Install OBS Studio (Windows)

To install OBS on Windows download it from the link below. Then launch the installer and follow the prompts.

Download OBS Studio

Open OBS Studio

open obs

After you have finished installing OBS Studio we can test the stream. Launch the program to get started.

Add a New Source

add a new source obs

Next click on the “+” button in the lower left to add a new source. I will be using the screen capture for this example, however feel free to use any source.

Choose Display

choose a display obs

Next it will ask which screen you would like to use. Generally it is on the correct option by default, but change it if it looks incorrect. Then click on the “OK” button.

Open OBS Settings Menu

open settings menu obs

Then we will need to open the OBS settings menu. Click on “Settings” in the lower right hand corner.

Stream to a Custom RTMP Server with OBS

stream to a custom rtmp server obs

Once the settings menu opens click on the “Stream” tab on the left hand side. Once you are on the tab change all three fields highlighted in red. Change the service drop down to “Custom…”, the Server to “rtmp://NGINX_SERVER_IP/live”, and the Stream Key to “test”. Then click on “OK” to save the changes.

Start the Test Stream

start streaming obs

After saving your streaming settings click on the “Start Streaming” button to begin the RTMP stream.

Open a Network Stream in VLC

open network stream vlc

Now we will test the RTMP stream using VLC Media Player. Launch the program then navigate to the “Media” tab in the top bar. Then click on “Open Network Stream…”.

Enter Network Stream URL

enter network url vlc

Enter the following into the box highlighted in red replacing “localhost” with your Nginx servers IP address. Then click on the “Play” button to start watching the stream.

rtmp://NGINX_SERVER_IP/live/test

Verify the RTMP Stream

verify rtmp stream

Verify that you can see your OBS stream. If you are able to see it then you have successfully streamed to a Nginx RTMP server using OBS Studio.

Questions?

If you have any questions or comments feel free to leave them below.

Related Resources

View our 5 Reasons to Switch from Windows 10 to Linux.

Learn How to Install Ubuntu Server 22.04 [Step by Step].

Check out our How to Easily Create a Bootable Linux USB Drive using Rufus article.

View our How to Setup an SFTP Server on Ubuntu 22.04 using OpenSSH tutorial.

Learn more cool things in Windows with our Linux Tutorials.

View all of our available online tools and converters at Formatswap.com.

How to Install and Configure Oh My Zsh in Linux

ohmyzsh splash

Using this tutorial you will learn how to install the popular bash shell alternative Oh My Zsh. Most Linux systems come preinstalled with the bash shell. Oh My Zsh adds many features compared to what you would find in this shell. Integrating Oh My Zsh into your workflow can provide numerous benefits. It’s easy to install, customize, and use, making it a must have tool for anyone looking to optimize their terminal experience. This will optimize and improve the speed and efficiency of your terminal based workflow.

Benefits of Oh My Zsh

One of the main benefits is spelling correction. While the standard bash shell offers this feature, Oh My Zsh does more efficiently and accurately. Another reason to use Oh my Zsh is the ability to easily install custom themes. There are hundreds of pre-built themes available for download on the projects GitHub page. Theming is also possible in the standard bash shell, however you are limited in the amount of customization you can easily achieve. The primary reason I recommend people switch to Oh My Zsh is its advanced command history ability. You can customize the shells history to your specific liking. This makes re-running past commands indefinitely easier. Don’t miss out on the chance to enhance your terminal with Oh My Zsh.

Update and Upgrade

update system

In this tutorial I will be using Ubuntu 22.04 to install the shell. However any Linux distribution that supports bash will support installing Oh My Zsh.

sudo apt update && sudo apt upgrade

Download and Install Curl

install curl

Next you will need to install the application curl. This will allow us to download and install Oh My Zsh using a curl command.

sudo apt install curl

Download and Install Zsh

install zsh

After installing curl you need to download the base zsh shell program. Install it by running the following apt command.

sudo apt install zsh

Installation Options

You are able to install Oh My Zsh using either the wget, fetch, or curl command. In this example I will be using wget. Use whichever method you prefer and run the command.

wget:

sh -c "$(wget -O- https://raw.githubusercontent.com/ohmyzsh/ohmyzsh/master/tools/install.sh)"

fetch:

sh -c "$(fetch -o - https://raw.githubusercontent.com/ohmyzsh/ohmyzsh/master/tools/install.sh)"

curl:

sh -c "$(curl -fsSL https://raw.githubusercontent.com/ohmyzsh/ohmyzsh/master/tools/install.sh)"

Download Oh My Zsh

download ohmyzsh

After running the command to download Oh My Zsh you will need to change it to your default shell. Type “y”, then press “Enter” to confirm the change.

sh -c "$(wget -O- https://raw.githubusercontent.com/ohmyzsh/ohmyzsh/master/tools/install.sh)"

Installation Successful

zsh successful install

You will see the following screen after Oh My Zsh finishes the installation process. The shell is almost ready for use. We just need to verify the installation and make a few edits to the zshrc configuration file. Press “Ctrl+C” twice to exit the Oh My Zsh installer.

Verify the Zsh Installation

verify zsh

Run the “zsh –version” command and verify that you have zsh 5.8 or newer.

zsh --version

Set Default Shell to Zsh

set shell to zsh

Set zsh as the default shell using the “chsh” command.

chsh -s $(which zsh)

Logout to Apply Changes

logout linux

Now you will need to logout of your user account to apply the new changes. Run the “pkill” command below. Once you have logged out, log back in and reopen your terminal.

sudo pkill -SIGKILL -u [your username]

Verify Current Shell

verify current shell

Next verify that your shell is set to zsh using the command below. You should see “/usr/bin/zsh” as the commands output.

echo $SHELL

Verify Shell Version

verify shell version

Now verify that the correct version of zsh is set as your default shell. You should see version 5.8 or newer.

$SHELL --version

Open the Oh My Zsh Config File

nano ~/.zshrc

Next we will customize the shell using the “.zshrc” file located in the home directory. Open the Oh My Zsh configuration file using the command below.

nano ~/.zshrc

Set a Oh My Zsh Theme

set a theme oh my zsh

Now you will want to set a theme. Locate the “ZSH_THEME” and modify it to the theme name of your choice. Above I have set my theme to “agnoster” as it is one of my personal favorites. You can view the full list of available themes to choose from on the Oh My Zsh Github page. Save the file when you are finished with your changes.

Apply the Configuration

source the zshrc config file

Once you are finished editing the zshrc config file you will need to apply the changes. Run the command below, then reopen your terminal.

source ~/.zshrc

Verify Oh My Zsh Theme

test theme

If everything worked correctly you will see your new theme. You have now successfully installed Oh My Zsh, and configured a theme. If you are interested in adding plugins to echance your shells experience even further, visit the plugins page on the Oh My Zsh Wiki.

Conclusion

In conclusion, with the help of this article you now have the tools to effortlessly set up and customize Oh My Zsh in your Linux environment. Say goodbye to mundane terminal sessions and hello to a more productive, customizable, and user-friendly shell experience.

Questions?

If you have any questions or comments feel free to leave them below.

Recommended By Our Editors

View our 5 Reasons to Switch from Windows 10 to Linux.

Learn How to Configure a Firewall in Linux using UFW.

Check out How to Setup OpenSSH with Keys on Ubuntu 22.04.

View our Deep Learning Image Style Transfer Tutorial Using Neural Style Pt tutorial.

Learn How to Create a Mapped Network Drive in Windows 10.

View all of our available online tools and converters at Formatswap.com.

How to Setup an SFTP Server on Ubuntu 22.04 using OpenSSH

sftp splash

In this article you will learn how to enable and connect to the SFTP server in OpenSSH. With SFTP (Secure File Transfer Protocol) you can easily transfer files over the internet using SSH. We will be using Ubuntu 22.04 for our server, however any version of Linux should work.

This guide will use password authentication with IP firewall restriction. This will prevent anyone besides those who you want accessing the box via SSH or SFTP. If you want the highest level of security possible you will want to enable keys in OpenSSH before following this guide. Learn how to enable keys with our How to Setup OpenSSH with Keys on Ubuntu 22.04 tutorial.

SFTP vs FTP

It is important to mention that SFTP is not the same as FTP. One of the main differences is while they both transfer files, only SFTP encrypts the data during transit. Another difference is FTP is unable to benefit from public key files for authentication. Using public keys with SFTP increases security by encrypting the transfer data stream. If your aim is security then it is highly recommended you use SFTP versus FTP. Now that I have described the differences lets move on to configuring and connecting to an SFTP server in OpenSSH.

Update and Upgrade Ubuntu

update and upgrade ubuntu

The first thing you need to do is update and upgrade your Ubuntu installation. Open a terminal and type the following command. Afterwards press “Y” to confirm.

sudo apt update && sudo apt upgrade

Install OpenSSH

install open-ssh

After your system has finished updating you will need to install the OpenSSH server software. OpenSSH provides encrypted file transfer for file transfers and remote logins. Install the software using the apt command.

sudo apt install openssh-server

View SSH Status

view ssh status

Next you need to verify that OpenSSH is installed on your system and actively running. Use the below command and confirm that you see “active (running)” on the third line.

sudo systemctl status ssh

If SSH does not show as active and running it may be disabled. Run the following command to enable and start the OpenSSH server.

sudo systemctl enable ssh && sudo systemctl start ssh

Create New User

create a new user

Now you will need to create a new user for logging into the SFTP server. Run the adduser command then type a password. You can skip the other fields if you wish. Finally press “Y” to confirm.

sudo adduser sftpuser

Create New Group

create a new group

Afterwards we will create a new group for our sftpuser. We will configure SSH to give SFTP access to any user in this group. Run the addgroup command to proceed.

sudo addgroup sftpusers

Add User to Group

add user to group

Next we need to add the user to the new group. Run the usermod command to add the sftpuser to the sftpusers group.

sudo usermod -a -G sftpusers sftpuser

Change User’s Home Permissions

change users home permissions

Then we will set new permissions on the sftpuser’s home directory. This will allow the SFTP server to access these files. First execute the chown command followed by the chmod command. The sftpuser’s home will be the folder you access when you connect to the SFTP server.

sudo chown root: /home/sftpuser
sudo chmod 777 /home/sftpuser

Edit the SSH Config File

Next we need to edit the sshd_config file and edit a few lines. Open the configuration file using the nano text editor as shown below.

sudo nano /etc/ssh/sshd_config

Locate the Subsytem Line

locate subsystem line

After you open the file scroll down and look for the Subsystem line. Once you locate the line comment it out using the “#” symbol as shown below.

#Subsystem      sftp    /usr/lib/openssh/sftp-server

Add New Lines

Now that you have commented out the Subsystem line you need to add a few additional lines. Paste the following underneath the line you commented out. Your sshd_config file should match the screenshot above. After the lines have been added save and close the file using “Ctrl+X”.

Subsystem sftp internal-sftp

Match Group sftpgroup
     ChrootDirectory %h
     X11Forwarding no
     AllowTCPForwarding no

Restart SSH

restart ssh

To apply our changes we will restart ssh. Use the following service command.

sudo service ssh restart

Configure the Firewall

The next step is to configure the firewall using UFW to control access to our SFTP server. Start by denying all incoming traffic, and allowing all outgoing.

sudo ufw default deny incoming
sudo ufw default allow outgoing

Allow SSH (All IP’s)

allow ssh

You have two options when allowing SSH through the firewall. You can either allow any IP to access port 22 (not recommended). Or you can only allow specific IP(s) through the firewall. I recommend the section option as it offers higher security. If you want to allow any IP run the following command.

sudo ufw allow ssh

Allow SSH (Specific IP’s)

allow specfic ip

If you want to only allow specific IP’s to access the server run the following command for each IP you want to have access. You need to replace “IP-ADDRESS” with your own IP. This is highly recommended as it offers the highest level of security.

sudo ufw allow from IP-ADDRESS to any port ssh

Enable UFW

enable ufw

After you have allow the IP’s (or everyone) who you want to have access you will need to enable UFW. Run the following command.

sudo ufw enable

Check Firewall Status

check firerwall status

The last step is to check the firewall status and verify your configuration. Check it using the ufw status command. If you allowed access to only specific IP’s you will see them in the “From” column.

sudo ufw status

Connecting to the SFTP Server

Finally we can test our connection to the SFTP server. The first thing you will need is a FTP client. I recommend downloading FileZilla. This is the software we will use in this tutorial. You can install it using the following apt command.

sudo apt install filezilla

Edit Site List

edit filezilla site list

Open Filezilla and click on the site manager button in the upper left hand corner.

Add a New Site

add filezilla site

Type Connection Information

add filezilla connection information

Confirm Host Key Prompt

confirm filezilla hostkey

Verify Connection

verify filezilla connection

Questions?

If you have any questions or comments feel free to leave them below.

Related Resources

View our 5 Reasons to Switch from Windows 10 to Linux.

Learn How to Install Ubuntu Server 22.04 [Step by Step].

Check out How to Setup OpenSSH with Keys on Ubuntu 22.04.

View our How to Mount an SMB (Samba) Share in Linux with cifs-utils tutorial.

Learn How to Use the Alias Command in Linux.

View all of our available online tools and converters at Formatswap.com.

How to Configure a Firewall in Linux using UFW

ufw linux firewall splash image

This tutorial will teach you how to install and configure UFW (Uncomplicated Firewall) in Linux. Firewalls are vital to keep your applications and systems secure. UFW provides a command line frontend interface for iptables using a few simple commands. It is designed to be easy to use and uncomplicated to configure. Using only Netfilter in iptables for firewalls can be a daunting task. UFW is a simple solution to using a firewall in Linux. In this tutorial we will be using Ubuntu 22.04 but any Ubuntu or Debian based Linux distribution will work.

Check if UFW is Installed

ufw status
sudo ufw status

The first thing you need to do is check if UFW is already installed. It is installed by default on most Linux distributions. You can check if UFW is currently installed by opening a terminal shell and running the “ufw status” command. If UFW is already installed you will see a similar output to what is above. It will say “Status: inactive”. If you get an error you will have to install UFW.

Install UFW

install ufw
sudo apt install ufw

To install UFW run the command “sudo apt install ufw”. Then click yes on the confirmation dialog.

Deny Outgoing and Incoming Connections

ufw allow outgoing
sudo ufw default allow outgoing

The first thing you want to do when configuring the firewall is to deny all incoming and outgoing connections. To deny outgoing connections run the command “sudo ufw default deny outgoing”.

ufw allow deny incoming
sudo ufw default deny incoming

Then repeat the same step using “sudo ufw default deny incoming” to deny the incoming connections.

Configure Firewall Rules

Allow a Program

allow ftp ufw
sudo ufw allow ftp

You can allow individual programs through the firewall using their names. Above I allow ftp using the command “sudo ufw allow ftp”.

Allow a Specific Port

allow port 21 ufw
sudo ufw allow 21

To allow a specific port use the command “sudo ufw allow 21”. In the above example I am allowing the FTP port 21.

Deny a Specific Port

deny port 22 ufw
sudo ufw deny 22

You can also allow specific programs and ports. In the above example I deny port 22 using “sudo ufw deny 22”.

Allow a TCP Port

allow tcp port 443 ufw
sudo ufw allow 443/tcp

You can also allow or deny specific ports to be tcp or udp only. In the above example I allow only tcp traffic on port 443.

Allow a UDP Port

allow udp port 111 ufw
sudo ufw allow 111/udp

You can also allow any deny udp ports as shown above. By default it will allow or deny on both tcp and udp unless you specify one of the two.

Allow and Deny Access to IP Addresses

Sometimes you may want to only allow certain IP addresses access to your system. In this case you can setup a rule to control access on a per IP basis.

Allow an IP

allow an ip address

Using the above rule you are able to allow only specific IP addresses to access your system. This is the securest way to setup a FTP or SSH server that needs remote access.

Deny an IP

deny an ip address

This rule is useful in situations where you are allowing all IP addresses through the firewall, but just want to block certain ones.

Enable or Disable UFW Firewall Rules

Enable UFW

enable ufw
sudo ufw enable

Now you will need to enable the firewall to apply the rule set you created. To enable the UFW firewall type “sudo ufw enable”.

Disable UFW

disable ufw
sudo ufw disable

If you need to disable the firewall you can run the command “sudo ufw disable”. This will keep the firewall disabled until you enable it again.

View the Firewalls Status

ufw view status
sudo ufw status

To view the status of the firewall type “sudo ufw status”. This will show you all of the ports and or programs that you are allowing or denying through the firewall. It will also show you whether UFW is active or inactive.

Advanced UFW Rules

ufw edit rules files
cd /etc/ufw/

Most rules can be applied using the command line but sometimes you want more control over the rules. In this case you can directly edit the rules using the “before.rules” and “after.rules” files located in the “/etc/ufw/” directory. The before rules are applied before UFW is launched while the after rules apply after UFW is running.

ufw edit config file
nano /etc/default/ufw

You can also edit the UFW configuration file located at “/etc/default/ufw” for more advanced configurations.

Enable Logging

ufw enable logging
sudo ufw logging on

You can enable logging in UFW by running the command “sudo ufw logging on”. This will enable the logs in the lowest mode by default. If you want to specify the log level use the command “sudo ufw logging low|medium|high“.

view of ufw log
nano /var/log/ufw.log

The UFW log file will be located at “/var/log/ufw.log” by default. I have set my logging level to low. Above is an example of what your log file may look like.

Additional Questions?

If you have any additional questions or thoughts feel free to comment them below.

Related Resources

View our How to install Kali Linux 2022.3 [step by step] tutorial.

Learn How to Use the Alias Command in Linux.

Check out our How to Add a Network Location in Windows 10 tutorial.

View our How to Setup a FTP Server with FileZilla in Windows tutorial.

Learn more cool things in Windows with our Windows Tutorials.

View all of our available online utilities and converters at Formatswap.com.

How to Setup OpenSSH with Keys on Ubuntu 22.04

ssh key splash

In this tutorial you will learn how to setup a SSH server to use a public key pair on Ubuntu. SSH is a secure protocol used for remotely administrating servers. We will be using OpenSSH to setup the server. SSH servers are great as they allow you to easily remote into any machine and execute commands. With public key authentication you get robust security. It is generally recommended that all users running an SSH server should enable key based authentication. You also don’t have to remember passwords when using key based authentication. For this tutorial we will be using Ubuntu 22.04 server, but you should be able to use any Linux operating system.

Generate Key Pair

generate key pair

The first step is to generate a key pair on your client machine. Type “ssh-keygen” and press “Enter”. If you get an error you may have to install the Openssh server as shown below.

sudo apt install openssh-server

Select Key Save Location

select key save file location

Next you will be asked to choose a save location for the key. Press “Enter” to use the default, or type a path and filename for the key.

Set a Key Password (optional)

select password

You will then be asked if you want to set a key on the password. This improves security but will require you to enter the password every time you connect to the SSH server. Either type a password or press the “Enter” key twice to not use a password.

Key Generated Successfully

key generated

Now you will see a message telling you that the key pair has been generated successfully. It will also list the fingerprint and the save location for the key.

Copying Public Key

copy the public key

Next we will copy the newly created key to your SSH server. Type in the following command to copy the key.

ssh-copy-id username@ssh-server-ipaddress

Enter the SSH Users Password

optionally select password for key

The server will then ask you to type in the password for the SSH user. Additionally if you set up a password on the key pair, you will also be prompted to type that.

Keys Successfully Added

keys added message

After typing your credentials you will be shown a screen telling you that the key has been successfully added.

SSH into the Server

ssh into the server

Now that the key has been added to the SSH server we need to connect back to the server. Connect to it using the SSH command as shown above.

Edit the OpenSSH Config File

edit the openssh config

Once you are connected to the server you will need to edit a file. Open the sshd_config file using the nano text editor.

sudo nano /etc/ssh/sshd_config

Disable Password Authentication

disable password authentication

Now that the file is open, use “Ctrl+W” to search for the line “PasswordAuthentication”. Once you locate the line change it from “PasswordAuthentication yes” to “PasswordAuthentication no”. This will cause the SSH server to only log you in using your key.

Save OpenSSH Config File

save openssh config

Next simply press “Ctrl+x” then the “Y” key to save the config file.

Restart OpenSSH Server

restart openssh server

Finally we will need to restart the ssh service on the server. Run the following command to complete this action.

sudo systemctl restart ssh

After the SSH service restarts, you will need to disconnect from the SSH server.

Test the SSH Connection

test ssh connection

Now we will test that we are able to login to the SSH server using our key pair. Simply try to reconnect to the SSH server. You will be automatically logged in if you don’t have a password on the key pair. Else you will need to enter the password you created for the key.

OpenSSH with a Key Pair is Enabled

successful key ssh

If you are able to connect to the SSH server then you have successfully setup a key for OpenSSH. Remember to keep the key pair in a secure location. Anyone with access to it would be able to login to your server.

SFTP Server (optional)

You can also enable secure file transfer with SFTP using OpenSSH. If you would like to activate the server view our How to Setup an SFTP Server on Ubuntu 22.04 using OpenSSH tutorial.

Additional Questions?

If you have any additional questions or thoughts feel free to comment them below.

Related Resources

View our list of The Top 10 Programming Languages to Learn in 2022.

Learn How to Install Ubuntu Server 22.04 [Step by Step].

Click here to learn How to Install MySQL on Ubuntu Server 22.04 LTS.

View all of our Linux Articles and Tutorials.

Learn How to install and configure Nginx – Ubuntu 20.04.

View all of our available online tools and converters at Formatswap.com.

How to install Kali Linux 2022.3 [step by step]

install kali splash image

In this tutorial you will learn how to install the Debian based Kali Linux operating system. Kali is designed for digital forensics as well as penetration testing. Kali is very useful to have installed if you are currently in or entering into the cyber security field. One of the main benefits of Kali Linux are its approximately 600 penetration testing tools preinstalled.

Download Latest Kali Version

The first step is to download the latest version of Kali Linux from the official website.

Download Kali Linux 2022.3

Boot USB or Select ISO

kali install screen

Next you will need to make a bootable USB drive using the Kali ISO file. You can read this tutorial on creating a bootable Linux USB drive using Rufus to learn more. After you create the bootable Kali USB drive, insert it into your computer and select the USB at boot. If you are using a virtual machine, simply select the Kali ISO as your boot device. Once you are booted into the installer, select “Graphical Install”.

Select System Language

kali select language

Now you will select the language you would like to use.

Select Location

select location

Next select your location.

Select Keyboard Layout

select keyboard layout

Afterwards you will need to select a keyboard layout.

Choose Hostname

choose a hostname

Now you will choose a hostname for the installation. You can enter any name you would like into the box.

Enter Domain Name (optional)

enter a domain name

The next step is to select a domain name. This step is optional, and usually unused. So I will be skipping it.

Set Account Name

set up accouont

Now you will enter the full name for the new user, afterwards press the “Continue” button.

Enter a Username

choose a username

Next you will need to set the username for the account. Enter it into the box and then press “Continue”.

Choose a Password

choose a password

After setting the username you will need to create a password for the new user. Enter the password and confirmation password.

Select the Timezone

select a timezone

Now you will set the system timezone. This will set the clocks to the correct time.

Set Partitioning Method

partition the disks

Next you will choose from four different partitioning schemes. Select “Guided – use entire disk” unless you want to encrypt the disk, then press “Continue”.

Select the Disk for Installation

select hdd

Now the installer will ask you which disk you would like to install Kali onto. (note, all data will be deleted from the selected device)

Choose Partition Scheme

partition scheme

The installer will then ask if you would like a separate home partition, or all files in the same partition. I recommend new users choose the all files in one partition option.

Confirm Partition Changes

finish partitioning

Now you will be shown a overview of the changes that are due to take place. Look them over then press “Finish partitioning and write changes”.

Confirm Write Changes

confirm write changes

You will then be prompted with a confirmation asking if you want to write the changes to the disk. Click “Continue”.

Wait for the Base System to Install

install base system

Wait for the base system to finish installing. This can take a while depending on the performance of your computer.

Software Selection

select kali software to install

Now you will be asked which desktop environment you want. As well as what software you would like installed. I recommend keeping all options to default as displayed in the above screenshot.

Install Grub

install grub bootloader kali

You will then receive a prompt asking you if you would like to install the Grub boot loader. Select the Yes checkbox and press “Continue”.

Select Grub Device

select a grub device

Now you will need to select which device to install Grub onto. Select the /dev/x device and then “Continue”.

Reboot the System

reboot kali system

Once you see this screen you are almost ready to begin using Kali. Simply remove your installation media and reboot the system.

Installation Complete

test login to kali

Once the system has rebooted you will see the login screen. You have now completed the installation of Kali 2022.3. Enter the credentials that you created earlier to start using Kali.

Additional Questions?

If you have any additional questions or thoughts feel free to comment them below.

Related Resources

View our 5 Reasons to Switch from Windows 10 to Linux.

Learn How to Create a Mapped Network Drive in Windows 10.

Click here to learn How to Easily Create a Bootable Linux USB Drive using Rufus.

View our OS Installs Category.

Learn more cool things in Windows with our Windows Tutorials.

View all of our available online tools and converters at Formatswap.com.

How to Mount an SMB (Samba) Share in Linux with cifs-utils

cifs-utils header image

In this tutorial you will learn how to use the CIFS-UTILS program to mount network shares. You will also learn how mount the file shares at boot. This allows you to avoid typing your credentials, as well as avoiding the use of the mount command when you turn on the system. With CIFS-UTILS you will be able to easily access files from a SMB share on your network. I will be using Ubuntu 22.04 LTS throughout this tutorial. However it is fine if you have a different version, as this guide will work on any Ubuntu based Linux distribution.

Update and Upgrade Ubuntu

update and upgrade ubuntu

The first thing you will need to do is update and upgrade your Ubuntu installation. Type in the following command and press Enter.

sudo apt update && sudo apt upgrade
install cifs utils

Now you will see a window asking you if you want to continue. Press “Y” and then Enter.

Install CIFS-UTILS

install cifs utils

Afterwards you will need to install cifs-utils. This is a program that allows you to easily mount different file shares on Linux. Type in the following command to install it.

sudo apt install cifs-utils

Create a Mount Directory

make share mount folder

Next you need to create a folder to mount the SMB share. You can create a folder in either /mnt/ or /media/.

sudo mkdir /media/Share
or
sudo mkdir /mnt/Share

Navigate to the Home Folder

cd to home folder

Now navigate to your home folder.

cd ~/

Create the Credentials File

create creds file

Once you are in the home folder you need to create a credentials file. A credentials file is vastly more secured versus providing the password and username in plain text.

nano .creds
enter user and pass cifs-utils

Now type your username and password in the format above. Once you have typed your credentials, press “Ctrl+X” then “Y” to save and quit the text editor.

Apply Permissions

apply permissions to creds file

Next we will apply the permissions to the credentials file. For security reasons you only want root to be able to read and write the file. Enter the command below to apply the changes.

sudo chown root: .creds && sudo chmod 600 .creds

Mount the SMB Share

mount smb share

Finally you will mount the SMB network share. Enter the below cifs mount command replacing the credential directory, IP address, mount location, and share name with your own.

sudo mount -t cifs -o credentials=/home/USERNAME/.creds,dir_mode=0755,file_mode=0755 //IPADDRESS/ShareName /mnt/Share

After you run the command you can navigate to the mount folder to view the network share that you have added. You have now successfully mounted a SMB network share using cifs-utils.

Auto Mounting

If you only use the mount command, your network share will no longer be mounted when you reboot. We will edit the fstab file and add a few entries. This is the file that defines what file systems are mounted at boot. Continue reading below to make the share persistent.

Edit the fstab File

edit fstab file

First we need to open the fstab file. Type in the following command to edit it.

sudo nano /etc/fstab

Add fstab Entries

mount cifs share

Now you will want to add a new line for mounting your cifs share. Use the code below as an example of what to type, replacing the credentials, IP, and share name with your own.

//IPADDRESS/ShareName  /mnt/Share  cifs  credentials=/home/USERNAME/.creds,file_mode=0755,dir_mode=0755 0  0

Reboot PC

reboot pc

The last step will be to reboot your PC. After rebooting you will see the network share mounted at /mnt/ShareName or /media/ShareName depending on where you created the folder. Thank you for reading the tutorial. If you are interested in similar technology tutorials check out some of our articles below.

Questions?

If you have any questions or comments feel free to leave them below.

Related Resources

View our How to Permanently Disable Windows Defender article.

Learn How to Install Ubuntu Server 22.04 [Step by Step].

Click here to learn How to install and configure Nginx – Ubuntu 20.04.

View our Programming Articles and Tutorials.

Learn more cool things in Linux with our Linux Tutorials.

View all of our available online tools and converters at Formatswap.com.

How to Use the Alias Command in Linux

linux header image

In this tutorial you will learn how to create your own custom alias commands in Linux. Setting up a Linux alias is a very easy thing to do. Aliases are very beneficial as they save a lot of time, such as remembering long or complicated commands. We will be adding our own aliases by editing the “.bashrc” file. This tutorial will work on virtually all Linux distributions. Continue reading below to get started.

Open the Terminal

launch terminal in linux

The first thing you need to do is open a new Terminal window in Linux.

Edit the .bashrc File

edit bashrc

Once you have the new terminal window open, enter the command nano ~/.bashrc and press Enter. This will open your .bashrc file using the nano text editor. The .bashrc file is a script that runs every time you launch Bash. You can add commands here for customizing and automating your Linux environment. If you open the file and it is blank it means you do not already have it (the file). The file will be created once you save using Ctrl+X, press the Y key, then press Enter.

Add the Command Alias’s

add alias commands to bashrc file

Towards the top of your bashrc file you will want to add a few new lines. Afterwards you can begin typing your alias commands. The format to use is alias aliasname=”Linux Command”. For example one of my aliases is ‘alias pg=”ping google.com”‘. When the command “pg” is ran, it will ping Google. The possibilities with aliases are endless. After adding your custom aliases simply save and close the file.

Reload the Bash Configuration

reload bashrc

Next you will have to reload the .bashrc file to reload the changes you just made. To do this type “source ~/.bashrc” and press Enter. The alias is now ready to be used.

Test the Linux Alias’s

test the alias command

To use your custom Linux aliases type the command that was written for it. In my example I used “pg” to ping google.com. Above is an example of the custom alias command running.

Additional Questions?

If you have any additional questions or thoughts feel free to comment them below.

Related Resources

View our list of The Top 10 Programming Languages to Learn in 2022.

Learn How to Install Ubuntu Server 22.04 [Step by Step].

Click here to learn How to Install MySQL on Ubuntu Server 22.04 LTS.

View our Programming Articles and Tutorials.

Learn How to install and configure Nginx – Ubuntu 20.04.

View all of our available online tools and converters at Formatswap.com.

How to Install Ubuntu Server 22.04 [Step by Step]

ubuntu splash image

In this beginner friendly tutorial you will learn how to install Ubuntu Server 22.04 LTS. Ubuntu Server is currently one of the most popular Linux based server operating system. One of the biggest advantages to using Ubuntu Server is the stability that it brings. As an LTS release it will provide you five years of security updates and support by default. This will ensure your server is always secure and has the latest software. To start this tutorial make sure you have a virtual machine, an unused hard drive, or a empty partition to be able to install the operating system. If you want to learn how how to make a bootable installation flash drive click here. You will also have to download the Ubuntu Server ISO file. You can do that by clicking this link. Download Ubuntu Server 22.04 LTS

Language selection

ubuntu install window

The first step after booting into your Ubuntu Server or ISO is to select the language. Choose your language and then press “Enter”.

Update the installer

ubuntu install window

Next the installer will ask you if you want to update. I recommend updating to the latest installer. Select “Update to the new installer” then press “Enter”.

Keyboard configuration

ubuntu install window

After that you will be brought to the keyboard configuration page. If you are okay with the default (automatic) keyboard layout, select “Done” and press “Enter” to continue.

Installation type

ubuntu install window

This page will ask you if you want to do the default Ubuntu Server installation or the minimal version. I recommend the first option. Select your choice then select “Done” and press “Enter”.

Network configuration

ubuntu install window

Next we have the network configuration page. By default the installer will automatically detect your IP address settings. If you want to change it select the network adapter “ens18” and press “Enter”. I recommend just keeping it at its default settings. Select “Done” and press “Enter”.

Configure network proxy

ubuntu install window

Afterward you will be brought to the proxy configuration page. If you have a proxy you would like to use enter its information. Else just select “Done” and press “Enter”.

Guided storage configuration

ubuntu install window

Now we will need to setup the storage configuration. Luckily the installer does the hard part for us. If you are using a full physical or virtual disk, select “Use an entire disk” and press “Space” to mark it. Afterwards select “Done” and press “Enter” to proceed.

Review storage configuration

install ubuntu 22.024

This next page will show you a review of the storage configuration changes that will take place. Review the disk and partition names, and if everything looks correct proceed to the next step.

Confirm storage configuration

install ubuntu 22.024

Now you will be asked to confirm the storage configuration options. Select “Continue” and press “Enter” to proceed to the next step.

Setup Ubuntu user account

install ubuntu 22.024

Afterwards you will need to setup your user account. Enter a name, server name, username, and password. Then click on “Done” and press “Enter”.

Install SSH

install ubuntu 22.024

This step is optional. If you would like to enable the SSH server select “Install OpenSSH server” then press “Space” to mark it. Afterwards press “Done.” and press “Enter”.

Wait for system to be installed

install ubuntu 22.024

Now the system will begin installing. This can take anywhere from 20-30 mins to fully install Ubuntu Server. Wait for it to complete.

Installation complete

install ubuntu 22.024

Once the installation is complete you will see this screen. Select “Reboot Now” and press “Enter” to reboot the system and continue.

Unmount USB drive or ISO file

install ubuntu 22.024

After the system reboots you will get a message telling you to “Please remove the installation medium, than press Enter”. Remove your USB drive or ISO file if you are using a virtual machine. Once you have completed this step press “Enter” one final time to reboot.

Login to Ubuntu Server 22.04

install ubuntu 22.024

You will be brought to the Ubuntu Server login screen. Type in the credentials you created for your account. You will then be logged into the system. You have now successfully installed Ubuntu Server 22.04. If you are looking for other Linux tutorials check out our articles below.

Related Resources

View our list of The Top 5 Programming Languages to Learn in 2022.

Check our our The Best Mechanical Gaming Keyboards to Purchase in 2023 article.

How to Install VeraCrypt and Encrypt a Flash Drive on Ubuntu 22.04.

Click here to learn How to Install MySQL on Ubuntu Server 22.04 LTS.

View our Programming Articles and Tutorials.

Learn more cool things in Linux with our Linux Tutorials.

View all of our available online tools and converters at Formatswap.com.

How to Install VeraCrypt and Encrypt a Flash Drive on Ubuntu 22.04

veracrypt ubuntu splash

Are you worried about your device being stolen? Do you have sensitive files to protect? If you answered yes to either of those questions then you would benefit from encrypting your drive with VeraCrypt. In this tutorial you will learn how to download, install, and setup encryption with VeraCrypt in Linux. One of the primary reasons to use VeraCrypt is that it is an opensource replacement for the now defunct TrueCrypt. Another benefit to VeraCrypt is the ability to encrypt both flash drives and hard disks. You also have the ability to create encrypted file containers. It supports the most popular encryption algorithms such as AES 256 and AES 512. All said you will get a much more robust and secure encryption solution compared to any paid encryption software you could purchase.

Add the required repository

The first step is to add the repository to your packages list.

sudo add-apt-repository ppa:unit193/encryption

Update Ubuntu

The next thing you will want do do is update and upgrade Ubuntu 22.04. To do that simply open a terminal and run the following command.

sudo apt update && sudo apt upgrade

Download and install VeraCrypt

The last step is to install VeraCrypt. You can do so with this command.

sudo apt install veracrypt

Encrypting a volume

In this section of the tutorial you will learn how to create the encrypted flash drive partition using VeraCrypt.

Launching VeraCrypt

You can launch VeraCrypt by searching for it in your systems start menu or app folder. After you launch the program click on “Select Device…”.

veracrypt encryption screen

Selecting a device to encrypt

A window will pop up showing all of the storage devices on your computer. Very carefully select the partition on the flash drive you want to encrypt. (warning, all data is wiped during the encryption process)

veracrypt encryption screen

Creating the volume

Next you will want to click create volume to begin the encryption process.

veracrypt encryption screen

Select VeraCrypt device type

After the “VeraCrypt Volume Creation Wizard” opens you want to select the second option highlighted in red. Then click the “Next” button.

veracrypt encryption screen

Select VeraCrypt volume type

The next step is to select the VeraCrypt volume type. Choose the first option on the list. “Standard VeraCrypt volume”.

veracrypt encryption screen

View devices

Afterwards you will have to click “Select Device…” to view the partitions.

veracrypt encryption screen

Select USB devices partition

Re-select the partition of the flash drive you want to encrypt. Then press “OK”.

veracrypt encryption screen

Volume confirmation dialog

A dialog will pop up confirming you would like to proceed. Click on the “Yes” button.

veracrypt encryption screen

Enter the administrator password

You will receive a popup asking you to type in the administrator password. Afterwards click on the “OK” button.

veracrypt encryption screen

Choose VeraCrypt encryption algorithm

On the next page you will be asked to choose a Encryption Algorithm and a Hash Algorithm. I recommend selecting “AES” for the first box, and “SHA-512” for the second box. After selecting your options click on the “Next” button.

veracrypt encryption screen

Type and repeat the encryption password

The next part of the wizard will have you enter and re-enter the encryption password you would like to use for the encrypted volume. Enter the passwords and click on the “Next” button.

veracrypt encryption screen

Select encrypted USB format options

On this page it will ask you to choose your flash drives format options. I recommend selecting “FAT”. Afterwards click on the “Next” button.

veracrypt encryption screen

Encrypt the USB partition

For this step you will have to randomly move your mouse for 20-30 seconds to generated the Random Pool key. The longer you do it for the better the cryptographic strength will be. After the blue bar is full click on “Format” to start the encryption process.

veracrypt encryption screen

Volume format dialog

You will be asked to confirm that you want to continue encrypting. Press the “Yes” button.

veracrypt encryption screen

Wait for device to encrypt

The encryption process could take anywhere from 5-30 minutes. Be patient and wait for the process to complete.

veracrypt encryption screen

Encryption successful dialog

When the device has finished the encryption process you will get this dialog telling you it is complete. Click on the “OK” button.

veracrypt encryption screen

Exit VeraCrypt

Now that your flash drives partition is encrypted you can exit the application by clicking the “Exit” button.

veracrypt encryption screen

Mounting encrypted volume

In this part of the tutorial you will learn how to mount the encrypted partition that you just created.

View the devices

The first step to mounting your partition is to select the device. Click on “Select Device…”.

veracrypt encryption screen

Select an encrypted partition to mount

Next you will want to select the partition of the flash drive that you encrypted in the above steps.

veracrypt window

Type in encrypted USB’s password

Finally type in the encrypted flash drives password.

veracrypt window

Opening encrypted USB drive

The encrypted flash drives partition will now show up in the VeraCrypt window. To open it and browse the files double click on the highlighted light blue bar. If you want to dismount the encrypted partition just select it and click “Dismount”. You now know how to download, install, and encrypt flash drive partitions using VeraCrypt on Ubuntu 22.04.

veracrypt window

Related Resources

View our list of The Top 5 Programming Languages to Learn in 2022.

Learn How to Generate Images using Neural Networks with VQGAN.

Click here to learn How to Install MySQL on Ubuntu Server 22.04 LTS.

View our Programming Articles and Tutorials.

Learn more cool things in Linux with our Linux Tutorials.

View all of our available online tools and converters at Formatswap.com.

Affiliate Disclaimer:

This website may contain affiliate links. This means we may receive a small commission if you purchase through our links. However, this does not impact our reviews and comparisons, as we only promote products we personally believe in. We are independently owned and the opinions expressed here are our own.