How to fix error the following packages have been held back in Linux Mint or Ubuntu Linux

When updating packages in Linux Mint 21 or Ubuntu 22.04 LTS, at times, a message appears, as shown below, that states the following packages have been held back.$ sudo apt-get dist-upgrade <enter> Reading package lists… DoneBuilding dependency tree… DoneReading state information… DoneCalculating upgrade… DoneThe following packages have been kept back:cryptsetup cryptsetup-bin cryptsetup-initramfs libcryptsetup120 upgraded, 0 … Continue reading How to fix error the following packages have been held back in Linux Mint or Ubuntu Linux

How to mount another hard disk for sharing with other users in Linux

Sometimes, a drive needs to be shared by more than that primary user logged in on a Linux computer. This is to facilitate sharing of files and folders by other users on that computer. To enable all authorized users to work with files and folders on the shared drive, read on. Any commands need to … Continue reading How to mount another hard disk for sharing with other users in Linux

How to create and use LUKS encrypted partition in Linux

It is easy to create a LUKS container and a partition within it, using the GUI on Linux. The application that enables this easily is the gnome-disk-utility. However, if you want to use the command line to set up a LUKS encrypted device, read on. Exercise appropriate caution before doing any of the below with … Continue reading How to create and use LUKS encrypted partition in Linux

How to securely wipe a hard drive or USB drive in Linux using dd or scrub

Normally we'd use dd to clean wipe a hard drive as follows after opening a terminal window for a hard disk or USB drive accessible as /dev/sdb :$ sudo dd if=/dev/urandom of=/dev/sdb status=progress <enter> Another command to do a secure wipe of /dev/sdb is scrub that can be used as follows:$ sudo scrub -p dod … Continue reading How to securely wipe a hard drive or USB drive in Linux using dd or scrub

Exodus Permissions and Trackers Report for Android Applications

If you need to find out the permissions and trackers that are required or in use by an Android application, visit, https://reports.exodus-privacy.eu.org/en/. Here, you can enter the application URL of any application from any app store and can see the results of the permissions the applications require and the trackers they use. As an example, … Continue reading Exodus Permissions and Trackers Report for Android Applications

Email: [Firebase] Client access to your Cloud Firestore database expiring in X day(s)

The easiest way to overcome this expiry is to change the date in the rules after logging into the account:match /{document=**} {// from previous date 2020, 11, 11 to new date 2021, 12, 11allow read, write: if request.time < timestamp.date(2021, 12, 11);} However, do note that it is important to drop access using this method … Continue reading Email: [Firebase] Client access to your Cloud Firestore database expiring in X day(s)

How to use India income tax Java utilities on Linux Mint 19

To run the Indian income tax Java utilities on Linux Mint 20 or Fedora 32 or Ubuntu 20.04 LTS, refer to this link https://askmeaboutlinux.com/2020/07/30/how-to-run-india-income-tax-java-utilities-on-linux-mint-20-or-ubuntu-20-04-lts/ Upon download and execution of the income tax India utilities for the ITRs for Java, the following error is display when the utility is run using Java 11 on Linux. "Error: … Continue reading How to use India income tax Java utilities on Linux Mint 19

How to shred a file on Linux leaving no remnants

Sometimes we have files on our hard disks that we would like to remove for good. If you have set up full disk encryption when you installed Linux on your computer, you will have an encrypted hard disk which is pretty much useless to anyone without the password that only you know. However, sometimes, to … Continue reading How to shred a file on Linux leaving no remnants

How to check if user name or ID has been compromised in a data breach

When data breaches occur, there are various kinds of data that get compromised. The most critical data that can get compromised is the user name or ID or the password. All is not lost due to a great service hosted by Troy Hunt. Use https://haveibeenpwned.com/ to check if the User name or user ID appears … Continue reading How to check if user name or ID has been compromised in a data breach