How to set one wallpaper on two screens with Superpaper

Trying to set up wallpapers on your dual-monitor Linux set up? Are you frustrated that your Linux desktop environment doesn’t have mutli-monitor wallpaper support? We can help! Follow along as we show you how to set one wallpaper on two screens with Superpaper!

Installing Superpaper on Linux

Superpaper is an excellent application, but it does not come pre-installed on any Linux operating systems. As a result, we must demonstrate how to install the app on the Linux platform before explaining how to use it to set a wallpaper.

To install the Superpaper application, open up a terminal window by pressing Ctrl + Alt + T or Ctrl + Shift + T on the keyboard. From there, follow the command-line installation instructions outlined below.

Python

The primary way of installing Superpaper is through the Python 3 package manager (AKA Pip3). To start the installation, ensure you have the Pip3 package manager set up on your system.

To install Pip3, check your Linux PC’s package manager for “python3-pip,” or “python-pip.” Once you’ve gotten the Pip3 tool up and running, use the pip3 install command below to install the Superpaper app.

pip3 install --user -U superpaper

Along with installing Superpaper, you will need to install the WXPython package. Without WXPython, the Superpaper UI will not work correctly. To install it, use the pip3 install command below.

pip3 install --user wxpython

Please note that during the installation, the Pip3 tool may quit unexpectedly, or experience issues. If you experience issues, re-run the installation commands.

AppImage

The developer of Superpaper has an experimental AppImage ready for use. It’s not perfect, and sometimes it may quit unexpectedly, but it’s a great alternative to those not looking to deal with Python and Pip3.

To get your hands on the latest Superpaper AppImage, open up a terminal window and use the wget download tool to grab it.

wget https://github.com/hhannine/superpaper/releases/download/v2.0.2/Superpaper-2.0.2-x86_64.AppImage

There’s also an AppImage built with the Ubuntu 16.04 code base available. Use the wget command below to grab the latest release.

https://github.com/hhannine/superpaper/releases/download/v2.0.2/Superpaper-2.0.2-x86_64-ubuntu1604base.AppImageThis logo will slowly fill up as the upgrading process goes on. B

After downloading the Superpaper AppImage, update its permissions with chmod.

sudo chmod +x Superpaper-2.0.2-*.AppImage

Once the AppImage file’s permissions are up to date, open up your Linux file manager and double-click on the Superpaper AppImage to run the program. Or, run the following terminal command.

./Superpaper-2.0.2-*.AppImage

Snap package

The Superpaper app is not yet in the Snap store, however, the developer has the Snap available for download on their GitHub release page. If you’re looking to try it out, ensure you have the Snapd runtime installed and enter the installation command below.

Note: the Snap release of Superpaper is very primitive and outdated compared to the Python and AppImage releases. Do not use the Snap version of the app unless you’re unhappy with the other methods of installation.

wget https://github.com/hhannine/superpaper/releases/download/v1.2.0/superpaper_1.2.0_amd64_experimental_classic.snap

sudo snap install superpaper_1.2.0_amd64_experimental_classic.snap --classic --dangerous

Using Superpaper to set wallpaper on multiple monitors

To set your wallpaper in Superpaper, start by opening the app on your desktop by searching for “Superpaper” in the app menu. Once Superpaper is open, follow the step-by-step instructions below to set your wallpaper.

Step 1: Find the “Profile Name” box, and write in a name for your new Superpaper profile. The app will not work without a saved profile.

Step 2: Click on the “Save” button to save your newly created Superpaper profile.

Step 3: Locate the “Browse” button, and click on it. After clicking on the “Browse” button, use the file browser to locate the wallpaper you wish to use with the Superpaper application, and click on it with the mouse.

Step 4: After selecting the wallpaper you’d like to use in Superpaper, click on the “Add source” button. By selecting “Add source” you’ll add it to Superpaper as a usable wallpaper.

Step 5: Locate the “Wallpaper paths” area for the wallpaper you’ve added to Superpaper. Click on the wallpaper image with the mouse. Upon clicking on the wallpaper image, you’ll see a preview of it in Superpaper.

Click on the “Apply” button to instantly apply the new wallpaper to your Linux desktop.

Slideshow

Want to make your Superpaper wallpaper set up a slideshow to showcase different wallpapers? Do the following.

Step 1: Click “Browse” to add a wallpaper folder to Superpaper.

Step 2: Select the “Add source” button to add the wallpaper folder as a Superpaper wallpaper source.

Step 3: Find the “Wallpaper slideshow” area, and check the box next to “Slideshow.” Selecting this option will enable the slideshow feature.

Step 4: Select the wallpaper folder in Superpaper. Then, click on the “Apply” button to turn on the slideshow.

Want to shut off the slideshow? Find the “Slideshow” box and uncheck it. Once the box is unchecked, find the “Apply” button and click on it to apply the new settings.

The post How to set one wallpaper on two screens with Superpaper appeared first on AddictiveTips.

Top Data Breach Detection Tools and Systems for 2020

In today’s world when we hear about cyberattacks on a regular basis, data breach detection is more important than ever. Today, we’re going to be reviewing the top data breach detection systems.

In a few quick words, a data breach is any event where someone manages to gain access to some data that he should not have access to. This is a rather vague definition and, as you’ll soon see, the concept of data breach is multi-faceted and it encompasses several types of attacks. We’ll do our best to cover all the bases.

Data breach detection tools and systems

We’ll start off by going into greater detail on what data breaching really means. After all, it can only help to start on the right foot. Next, we’ll explore the various steps involved in data breaching. Although every attempt is different, most follow a similar pattern that we’ll outline. Knowing these steps will help you better understand how different solutions operate. We’ll also have a look at the various causes of data breaches. As you’ll see, they’re not always the act of organized criminals. Our next order of business will be the actual protection against breaches, and we’ll explore the different phases of the breach detection and prevention process. A short pause will let us explore the use of Security Information and Event Management tools as a mean of detecting data breaches. And finally, we’ll review a few of the best products you can use to detect and prevent data breaches.

Data Breaching In A Nutshell

Although the concept of data breaching varies depending on your industry, the size of your organization, and network architecture, all data breaches share some common traits. A data breach is primarily defined as the unauthorized access to some otherwise private data. The reasons why hackers steal data and what they do with also varies a lot but again, the key here is that the information those hackers access does not belong to them. It is also important to realize that data breaches can include either what is referred to as the exfiltration of information by malicious users or data that was accessed regularly but disseminated without authorization. Obviously, that second type of breach can be much harder to detect as it stems from regular activity.

Although there are different types of data breaches—as we’ll see shortly—they will often follow a set pattern. Knowing the various steps that malicious users take to pull off their data breaches is important as it can only help better analyze your own vulnerabilities and prepare and set up better defenses that can make it much more difficult for cybercriminals to penetrate. It is often said that knowledge is power and it is particularly true in this situation. The more you know about data breaches, the better you can fight them.

Using SIEM Tools as Breach Detection Tools

Security Information and Event Management (SIEM) systems can turn out to be very good at detecting data breaches. While they do not provide any protection, their strength is in detecting suspicious activities. This is why they are very good at detecting data breaches. Each data breach attempt will leave some traces on your network. And the traces that are left behind are precisely what SIEM tools are the best at identifying.

Here’s a quick look at how SIEM tools work. They first collect information from various systems. Concretely, it often takes the form of collecting log data from your networking devices, security equipment—such as firewalls, and file servers. The more data sources there are, the better your chances of detecting breaches. Next, the tool will normalize the collected data, ensuring that it follows a standard format and that discrepancies—such as data from a different time zone—are compensated for. The normalized data is then typically compared against an established baseline and any deviation triggers some response. The best SIEM tools will also use some sort of behavioural analysis to improve their detection rate and reduce false positives.

The Top Data Breach Detection Tools

There are different types of tools for detecting data breaches. As we’ve just discussed, SIEM tools can help you with that while providing many more security-oriented features. You won’t be surprised to find a few SIEM tools on our list. We also have some dedicated data breach detection tools that can handle most of the steps of the detection cycle described above. Let’s review the features of a few of the best tools.

1. SolarWinds Security Event Manager (FREE TRIAL)

When it comes to Security Information and Event Management, SolarWinds proposes its Security Event Manager. Formerly called the SolarWinds Log & Event Manager, the tool is best described as an entry-level SIEM tool. It is, however, one of the best entry-level systems on the market. The tool has almost everything you can expect from a SIEM system. This includes excellent log management and correlation features as well as an impressive reporting engine.

SolarWinds Security Event Manager Screenshot

The tool also boasts excellent event response features which leave nothing to be desired. For instance, the detailed real-time response system will actively react to every threat. And since it’s based on behaviour rather than signature, you’re protected against unknown or future threats and zero-day attacks.

In addition to its impressive feature set, the SolarWinds Security Event Manager’s dashboard is possibly its best asset. With its simple design, you’ll have no trouble finding your way around the tool and quickly identifying anomalies. Starting at around $4 500, the tool is more than affordable. And if you want to try it and see how it works in your environment, a free fully functional 30-day trial version is available for download.

2. Splunk Enterprise Security

Splunk Enterprise Security—often just called Splunk ES—is possibly one of the most popular SIEM tools. It is particularly famous for its analytics capabilities and, when it comes to detecting data breaches, this is what counts. Splunk ES monitors your system’s data in real-time, looking for vulnerabilities and signs of abnormal and/or malicious activity.

SolarWinds Security Event Manager Screenshot

In addition to great monitoring, security response is another of Splunk ES’s best features. The system uses a concept called the Adaptive Response Framework (ARF) that integrates with equipment from more than 55 security vendors. The ARF performs automated response, speeding up manual tasks. This will let you quickly gain the upper hand. Add to that a simple and uncluttered user interface and you have a winning solution. Other interesting features include the Notables function which shows user-customizable alerts and the Asset Investigator for flagging malicious activities and preventing further problems.

Since Splunk ES is truly an enterprise-grade product, you can expect it to come with an enterprise-sized price tag. Pricing information is unfortunately not readily available from Splunk’s website so you will need to contact the company’s sales department to get a quote. Contacting Splunk will also allow you to take advantage of a free trial, should you want to try the product.

3. SpyCloud

SpyCloud is a unique tool from an Austin-based security company that offers organizations accurate, operationalized data they can use to protect their users and their company from data breaches. This includes normalizing, de-duplicating, validating, and enriching all the data it collects. This package is typically used to identify exposed credentials from employees or customers alike before thieves have a chance to use them to steal their identity or sell them to some third party on the black market.

One of the main differentiating factors of SpyCloud is its assets database, one of the largest of its king at over 60 billion objects as of this writing. These objects include email addresses, usernames, and passwords. Although the system makes use of scanners and other automated collection tools, most of the tool’s useful data—or should I say the tool’s most useful data—comes from its human intelligence gathering and advanced proprietary trade craft.

SpyCLoud Home Page

The SpyCloud platform offers a winning combination of unparalleled quality, clever automation and a super easy to use API to run automated and consistent checks of your organization’s user accounts against the SpyCloud database of credentials. Whatever match it finds quickly triggers an alert. As a result, a notification is sent out and , optionally, a remediation can be accomplished by forcing a password reset of the compromised account.

Malicious users seeking to take over personal and corporate accounts will definitely meet their match with this product. Several similar solutions on the market will find exposed accounts way too late in the process to let you do more than merely managing the consequences of a data breach. This is not the case with this products and it is obvious that its developers understand the importance of early detection.

This product is ideal for organizations of any type and size and from virtually every industry such as retail, education, technology, financial services, hospitality, and healthcare. Cisco, WP Engine, MailChimp, and Avast are examples of some of the prestigious clients that use SpyCloud to protect their accounts.

Pricing information is not readily available from SpyCloud and you’ll need to contact the company to get a quote. The company’s website states that a free trial is available yet clicking the link takes you to a page where you can register for a demo.

4. Kount

Kount is a Software as a service (SaaS) data breach detection platform. Based in Boise, ID and founded some twelve years ago, the company offers data security in addition to breach detection services to organizations throughout the world. Its patented machine learning technology operates by examining transactions at a microscopic level to detect stop malicious activities. While the service seems to be particularly well suited for online businesses, merchants, acquiring banks, and payment service providers, it can serve other types of businesses as well. It prevents account takeover, fraudulent account creation, brute force attacks while also detecting multiple accounts and account sharing.

Kount Home Page

Kount can provide your organization with enough data and toolsets to counter most online threats and protect the data of your customers, employees, and users from all kinds of cyberattack. The service has a huge customer base of more than 6 500 companies including some top-notch brands that rely on the service to guard against data breaches.

What we have here is an easy-to-implement, efficient solution that can be tailored to address the security concerns of various organizations operating in different segments. It makes the entire task of fraud detection much simpler. As a result, it empowers organizations to handle a greater transaction volume, thereby leading to better profits and overall growth.

Kount is available in three versions. First there’s Kount Complete. As its name implies, this is the complete solution for any business that interacts with its customers digitally. There’s also Kount Central, a service specifically tailored for payment solutions providers. And then there is Kount Central for digital account protection. The various solutions start at $1 000 per month, with prices varying depending on the number of transactions you plan to run through the service. You can get a detailed quote or arrange for a demo by contacting the company.

The Breaching Process Step-By-Step

Let’s have a look at what the typical steps of a data breach attempt are. While the activities outlined below are not necessarily the rule, they give you a valid overview of how your average data hacker works. Knowing about those will allow you to better prepare to fight attacks.

Probing

This first step in most attacks is a probing phase. Malicious users will often start by attempting to learn more about your network and overall digital environment. They could, for instance, probe your cybersecurity defences. They could also test passwords or evaluate how to launch an eventual phishing attack. Others will look for out-of-date software without the latest security patches, a sign that exploitable vulnerabilities could be present.

Initial Attack

Now that hackers have probed your environment, they will have a better idea of how to carry their attack. They will typically launch a first wave of attack. This could take many forms such as sending a phishing email to employees to trick them into clicking a link that will take them to a malicious website. Another common type of initial attack is executed by corrupting some essential applications, often disrupting workflow.

Expanded Attack

After a successful initial attack, cybercriminals will often quickly switch to high gear and evaluate their next steps. This will often mean leveraging whatever grip they got from their initial efforts to launch a broader attack that can target the whole environment to locate as much valuable data as they possibly can.

Data Theft

Although we’re listing it last, the actual theft of your data is not necessarily the last step of a typical attack. Hackers are often very opportunistic and will grab whatever interesting information they can get their hands on as soon as they find it. Others, on the other hand, may choose to lay dormant for a while in an effort to avoid detection but also to better understand what data is available and how it can best be stolen.

What exact information cybercriminals will take from any organization varies greatly. But since “money makes the work go ‘round”, it is estimated that at least three-quarters of all the data breaches are financially motivated. The stolen data may often involve trade secrets, proprietary information, and sensitive government records. It could also very well be centred on your customer’s personal data that could be used for the hackers’ own gain. Several hugely publicized data breaches have been reported in the past few years involving giants such as Facebook, Yahoo, Uber, or Capital One. Even the healthcare sector can be the target of attacks, potentially putting the public’s health at risk.

Causes Of Breaches

Data breaches can have multiple causes, some of which you may not even suspect. Of course, there’s the obvious cyberattack but those only account for a relatively small fraction of all data breaches. It is important to know about these various causes as this is how you’ll be able to better detect and stop them from happening. Let’s have a quick look at a few of the main causes.

Cyberattacks

The cyberattack—in which your organization is the direct target of hackers—is, as you would imagine one of the primary causes of data breaches. The annual cost of cybercrime is estimated to exceed $600 billion throughout the world so it’s no wonder that organizations are so concerned about it. Cybercriminals use a broad arsenal of methods to infiltrate your networks and exfiltrate your data. Those methods can include phishing to gain access through unwary users or ransomware to extort organizations after taking their data hostage. Exploiting various software or operating system vulnerabilities is another common way to rob organizations of their precious data.

Internal Breaches

Internal breaches can be more insidious than cyberattacks. Their goals are the same but they are carried out from within the network. This makes their detection much more complicated. They are often the fact of disgruntled employees or employees suspecting they are about to be terminated. Some hackers will even approach employees and offer them money in exchange for information. Another common cause of internal breach comes from employees that have been dismissed but whose access credentials have not yet been revoked. Out of spite, they could turn against their former organization and steal its data.

Device Loss

Although not as common a cause of data breach as the previous ones, device lost still plays a non-neglectable role in data breaches. Some users are simply careless and will leave various devices such as smartphones, laptops, tablets or thumb drives in insecure locations. These devices could potentially store proprietary data to provide easy and unfettered access to your network. A related cause of data breach is device theft where ill-intentioned individuals will steal user’s devices to either gain access to the data they contain or to use them as a gateway to your corporate data. And don’t think that the fact that all these devices are secured makes them any less of a risk. Once malicious users get their hands on your devices, cracking the security should be a piece of cake.

Human Error

The main difference between human error as a cause of data breaches and internal breaches is that the former is accidental. It can take many forms, though. For instance, some IT team may have accidentally exposed customer data to unauthorized employees as a result of misconfiguring access rights on a server. Another cause of breach related to human error has to do with employees falling victim to phishing or social engineering endeavours. Those are the kind of attacks where hackers trick your staff into clicking malicious links or downloading infected files. And you should not take human error lightly as research has shown that it accounts for more than half of the data breaches.

Protecting Against Breaches

Now that we know what data breaches are, what they look like and what their causes are, it’s time we have a closer look at protecting against them. With the various types and causes of data breaches, defending your organizations against them can be a daunting prospect. To assist you, we’ve assembled a list of the phases of protecting against data breaches. Together, they form the building blocks of any serious defense strategy. It is important to realize that this is an ongoing process and you should view the stages as part of a circle rather than a once-over linear approach.

Discovery

The discovery phase is where security professionals work through sensitive information in order to identify any unprotected or otherwise vulnerable or exposed data. This is important as that kind of information can be an easy target for malicious individuals. It is, therefore, very important to take the necessary steps to secure it. One way to do that is by reviewing who has access to that data and changing authorizations to ensure that only those who need to work with it can access it.

Detection

The next phase is the detection phase. This is where you should be monitoring for security threats that can provide cybercriminals with easy entry points into your network. This is a critical phase as it can be extremely easy for hackers to access your data if you don’t actively work on detecting and patching whatever vulnerabilities exist. For example, any application that hasn’t been updated with the latest security patches ca become an easy target for attackers who are free to exploit whatever vulnerabilities there are. This phase, more than all others, has to be an ongoing or recurring process.

Prioritization

Once you’ve gone through the previous phases and have pinpointed your risks, the last step before you can actually start fixing things is the prioritization phase. The idea here is to triage what assets are at risk in order to quickly secure the most exposed or those that would have the worst consequences should they be breached. This is where you’d typically use the combine intelligence of security information and data operations to pinpoint where you are at the greatest risk of being attacked. This phase is often conducted through audits that can help understand what needs to be prioritized.

Remediation

The remediation phase is where you resolve the threats that you’ve identified and prioritized during the previous phases. The exact remediation process varies according to the type of threat that has been identified.

Process Management

This whole process needs to be managed strategically and effectively. If you want the data breach prevention cycle to work for your organization, you’ll need to take control and use the proper tools. These are tools that can leverage data from your network and turn in into actionable insights. As we said before, this is more of an ongoing process than a one-time thing. And don’t expect this to be a set-and-forget kind of thing. Staying abreast of data breaches will require constant efforts. This is why investing in tools that can make all this easier is well worth it.

In Conclusion

Data Breach prevention is just about as important as it is a complex topic. I hope we’ve managed to shed to useful light on the subject. The key point to remember from all this is that the risk is real and doing nothing about it is not an option. Now, whether you choose to go with a SIEM tool or a dedicated breach detection and/or prevention solution is up to you and it largely depends on the specific needs of your organization. Look at what’s available, compare the specifications and features and, before you make your final decision, try a few tools.

The post Top Data Breach Detection Tools and Systems for 2020 appeared first on AddictiveTips.

5 Best Typing Apps for Kids

Typing is now one of the most essential computer and technical skills for students to learn in 2020. Students who can’t type properly end up wasting valuable test time especially in computer-based testing scenarios because bad typing slows them down.

With good typing or keyboarding skills, they can get their assignments and tests done much faster.

The good news is that there are plenty of typing apps for kids that’ll teach them how to type without being boring. Follow along to find out the best typing apps to get your child’s tiny fingers moving.

Animal Typing (Android & iOS – $11.99)

This app offers a simple and fun way for kids to learn touch typing. Different animals such as a snail, rabbit, or horse are used based on the child’s typing skills so the faster they type, the faster the animal gets. If he or she types with greater accuracy, they can unlock a cheetah and other wild animals.

This technique helps the child learn and master the skill at a young age as there are no shortcuts to the practice that’s required. The app also gives feedback on your child’s progress and accuracy, which forms the basis for them to learn touch typing.

It’s a fun and engaging app that’ll help your child learn how to type through practice and familiarity, but they have to put in the time and effort to be able to type at reasonable speeds.

You can use a Bluetooth keyboard or type directly on the animated keyboard to help your child learn touch typing. A set of 32 lessons is available for kids under 10 years old with animated fingers that show them the proper typing technique, and advanced lessons for special characters like symbols, numbers and more.

Dance Mat Typing

Dance Mat Typing is an animated, colorful and entertaining typing teacher. Kids learn through four levels starting from the home row keys and then move to the next levels, which build up on the previous lessons.

With help from some animal friends, kids learn the proper positioning of hands and letter placement on the keyboard.

Each level is divided into three stages, and ends with a test that allows the children to test their speeds before they can earn exciting rewards. The first level teaches them how to use the A,S,D,F,G,H,J,K,L keys, and then they advance to the next two levels where they learn the keys above and below the home row keys.

Claudette the Cat shows them how to make capital letters using Shift key, add letters X and Z, and type characters like the slash, apostrophe and period.

The free, web-based typing app for kids offers simple instructions that kids can follow along and practice what they’ve learned. It also allows them to complete a level on one day and start the next level on a different day, making it flexible and simple for the kids to progress.

Keyboard Fun (iOS)

This fun, practical, and engaging app is designed by Susan Hossack, an occupational therapist, and it introduces kids with autism, physical or learning disabilities to letters, and matching keys to pictures.

This way, the children can associate the letters with words and easily locate them on a keyboard, learn how to type faster, and learn the alphabet too. 

The app displays both upper and lower case, grades each task for progress, and rewards them with sight and sound as they match keys correctly.

Typing Fingers (Android & iOS)

Typing Fingers attempts to get children to learn and develop the skill of keyboarding at an early age.

The app uses gamification spread over 32 levels, which teach children how to identify letters, numbers, symbols and memorization to enhance the basic skill, and motivates them to win by offering prizes to get to the next level.

In all 32 lessons, a guide called Dennis helps the kids learn through the initial stages of memorization and using the correct fingers for each key. After this level, game mode is activated and the children have to shoot the correct letter, number and symbol by hitting the corresponding keys on the keyboard. The levels gradually build up so that children get to learn how to use the keyboard in an easy but fun way.

At the final stage of each level, they’ll be timed and get scores based on the time they take to complete the test and the level of accuracy. They’ll also receive a typing certificate for successful completion of the final test.

Type-a-Balloon

As its name suggests, this typing app for kids teaches children how to type using balloons. It’s designed in the form of a simple but fun game where kids type the letters that appear on the balloons to pop them.

If a balloon escapes into the atmosphere, the child loses one of his or her five lives, and any incorrect response takes away from the points they’ve already accumulated. As they improve their typing skills, they move a level higher.

The web-based app is ideal for kids of all ages looking to improve their keyboarding skills, but parents can join in the fun too.

Get Those Tiny Fingers Moving

It can be fun for kids to learn how to type. With these handy apps, you can start a new typing adventure with your kids and help them learn a new and useful skill. For more educational fun, try these math apps for kids. And if your youngster loves to read, check out these cool reading apps for kids

4 Best Gaming Keyboards for Linux Use

Are you in need of a good gaming keyboard for your Linux PC? Are you overwhelmed with all of the options available, and unsure of what keyboards have support for the Linux platform?

We can help — here’s our list of the best gaming keyboards to use on Linux!

Gaming keyboard types

You may think that all gaming keyboards are the same, but you’d be wrong. As it turns out, there are two different types of gaming keyboards in use on PCs today. These types are membrane and mechanical.

Membrane keyboards: powered by simple rubber switches. These switches are in use on most keyboards, as the technology behind a membrane keyboard is much cheaper than that of other solutions. Membrane keyboards are notoriously hard to clean, as the keys are usually not replaceable. They’re also less responsive than mechanical ones.

Mechanical keyboards: powered by mechanical switches, mechanical keyboards are not new. The technology that powers them dates back to the early PC/Mac days and the tech has not changed very much since. Mechanical keyboards are highly attractive to gamers, as they offer a faster key-press response than membrane ones provide. Mechanical keyboards usually cost more, as the switches are not cheap to produce.

How we picked

The type of keyboard you use while gaming matters a lot. If you’re not sure what to look for when choosing a gaming keyboard that works well on Linux, this section will help you make an informed decision.

Drivers

As Linux is not as well-supported as the Windows and Mac operating systems, the most important thing to take into account when purchasing a gaming keyboard is if the keyboard you are buying has driver support on Linux.

Most keyboards work out of the box on Linux. However, they all use the generic Linux keyboard driver. To get the most out of your gaming keyboard on Linux, you’ll need to find out if it comes with Linux-compatible drivers that will allow it the custom keys to be programmed, the RGB lighting to be changed, allows the included media keys to function, etc.

Manufacturer

When it comes to Linux support, the manufacturer is important to take into consideration. The reason? Not a lot of gaming keyboard manufacturers bother to support Linux. If you plan to spend your hard-earned cash on a new gaming keyboard, look into the manufacturer and see if they have a history of supporting Linux, or at the very least if the device is popular enough in the community to have open-source support.

Comfort

Keyboard comfort matters a lot while gaming, and you’ll have a much better experience if the device you are using feels nice to use. That’s why it’s crucial to take into account the design of the keyboard and ensure that it can deliver the comfortability required to have an enjoyable experience.

Lighting

Most modern gaming keyboards have RGB lighting, but not all of them support changing the lighting settings on Linux. If you care a lot about customizing the RGB lighting of your gaming keyboard, make sure to get one that supports changing it on Linux.

Best Gaming Keyboards for Linux Users?

Based on our extensive research, these are the best Linux gaming keyboards on the market right now.

1. Corsair K70 RGB MK.2 RAPIDFIRE

The Corsair K70 RGB MK.2 RAPIDFIRE is a mechanical gaming keyboard built by the Corsair PC accessories retailer. It uses Cherry MX Speed switches and promises to be low-profile and comfortable to type with.

Like every Corsair keyboard, the K70 RGB MK.2 RAPIDFIRE has excellent media controls, volume controls, and a stellar RGB lighting system. Though these media keys are great, the keyboard has official Linux support from the Corsair company. Thankfully, the K70 RGB MK.2 RAPIDFIRE keyboard works very well on Linux with the open-source CKB project.

In our experience with the Corsair K70 RGB MK.2 RAPIDFIRE, we found that it worked very well on Linux, once the open-source CKB tool was installed. We also found that the media keys did not work on every Linux operating system, but this is fixable with Playerctl.

Pros

  • A sturdy aluminum frame means the keyboard is built to last.
  • Dedicated media keys/volume keys.
  • The K70 RGB MK.2 RAPIDFIRE is a mechanical keyboard and sports Cherry MX switches.
  • Users can store up to 3 different keyboard profiles into the K70 RGB MK.2 RAPIDFIRE’s memory.
  • USB pass-through allows users to hook up their favorite USB devices right to the keyboard.
  • “Lock” feature prevents games from minimizing themselves.
  • Plastic wrist-rest makes typing more comfortable.
  • Supported on Linux via the open-source CKB project.

Cons

  • No programmable row of keys.
  • The RGB lighting and other features cannot be tweaked without installing a third-party tool on Linux.
  • Media keys don’t work on obscure Linux distributions without Playerctl.
  • The price is slightly expensive.

2. Corsair K55 RGB

The Corsair K55 RGB gaming keyboard is a membrane-based gaming keyboard for PC built by the gaming company Corsair. It has a fully programmable key-row that users can use for custom actions, a set of media keys that let users control media playback, and a volume control system.

Support for the Corsair K55 RGB gaming keyboard doesn’t come officially from the Corsair company. However, the keyboard still enjoys excellent Linux support thanks to the hard work of the open-source project CKB, which offers keyboard drivers, and a configuration tool for almost all Corsair devices on the market.

In our testing with the Corsair K55 RGB keyboard, we found that it worked very well out of the box, but that the media keys did not function on every Linux distribution. Luckily, Playerctl solves this problem.

Pros

  • Has a row of 6 programmable keyboard keys.
  • Very affordable price tag.
  • It comes with a plastic wrist-rest.
  • Compatible with the Xbox One for keyboard-enabled video games.
  • Dedicated media keys/volume keys.
  • Ten pre-configured lighting modes.
  • It is supported on Linux via the open-source CKB project.

Cons

  • Membrane keys feel cheap compared to mechanical models.
  • Media keys don’t work on obscure Linux distributions without Playerctl.
  • The macro keys and RGB lighting can’t be tweaked without installing a third-party tool on Linux.

3. Razer Huntsman Elite

The Razer Hunstman Elite is a compact gaming keyboard for PC built by the Razer company. It is fully RGB,  and much like the Ornata Chroma, it offers up programmable key macros that can be used for gaming or other functions, as well as a soft wrist rest, media control buttons, and a volume rocker to control speaker volume.

The Huntsman Elite is a Razer keyboard, which means that it does not enjoy official driver support. However, if you pick up a Huntsman Elite, you will still enjoy excellent, open-source support thanks to the RazerGenie app on Flathub.

In our testing, we found that the Huntsman Elite worked out of the box on most Linux distributions. However, like the Chroma Ornata, the Huntsman Elite has some functions that do not work very well without the RazerGenie app installed.

Pros

  • Mechanical keys make for a comfortable typing experience.
  • Dedicated media controls.
  • It is supported on Linux via the RazerGenie app.
  • Magnetic, plush wrist rest for ultimate comfort.
  • Excellent Razer Purple mechanical key switches are clickier, more responsive, and quieter than standard MX switches.
  • Supports 16.8 million colors on individually backlit keys.

Cons

  • Razer Chroma is not confirmed to work with Linux.
  • Expensive price tag.
  • Requires the third-party RazerGenie app to access some advanced features.

4. Razer Ornata Chroma

The Razer Ornata Chroma gaming keyboard is fully RGB, has membrane key switches, and a comfortable wrist-rest for extended use. In terms of features, the Razer Ornata Chroma offers a “fully customizable” macro-key system which will help with gaming hotkeys, built-in media control macros, and a lock feature that prevents games from accidentally minimizing.

As of now, Razer does not offer its official mouse/keyboard configuration tool for Linux users. However, the Ornata Chroma still enjoys stellar Linux support thanks to the RazerGenie app on Flathub, which allows users to change programmable keyboard settings.

In our experience with the Razer Ornata Chroma, we found that it worked very well on Linux. However, some keyboard features did not work at all without making use of the RazerGenie app.

Pros

  • Relatively inexpensive price tag.
  • Detachable plush wrist rest.
  • Programmable macro keys.
  • Supported on Linux via the RazerGenie app.
  • 16.8 million RGB lighting choices.
  • Dedicated media controls.

Cons

  • Membrane keys.
  • Requires the third-party RazerGenie app to access some advanced features.
  • Razer Chroma is not confirmed to work with Linux.

Conclusion

In this list, we went over some of the best gaming keyboards to use on Linux. We talked about their features, as well as some issues they all have on the platform. However, these aren’t the only gaming keyboards out there with excellent Linux support. Tell us about your favorite gaming keyboard to use on Linux in the comment section below!

The post 4 Best Gaming Keyboards for Linux Use appeared first on AddictiveTips.

4 Best USB Ethernet Adapters for Linux

Trying to find a USB ethernet adapter that works well on Linux? Tired of buying networking equipment that doesn’t work out of the box? Follow along with our list as we go over 4 ethernet adapters that work well on Linux!

Choosing a USB Ethernet adapter

A USB ethernet adapter can bring new life to an old computer with a slow ethernet jack, add speedy network transfer rates to a laptop with a slow WiFi card, or get you out of a jam when you need more than one network card. So, let’s answer the question “What to look for when choosing a USB ethernet adapter.”

Network transfer rate

The first thing you should look into when choosing a USB ethernet adapter is its network transfer rate. Yes, most adapters indeed advertise themselves as “gigabit,” but often, that amounts to the maximum speed possible. For best results, look at the average speed you will get when using it.

USB type

With USB networking adapters, the USB type is critical. You need to know what kind of connector the device uses, as it will determine the speed of the network device. For example, a USB 3.0 adapter is going to perform faster than a USB 2.0 one, etc.

Best USB Ethernet Adapters for Linux

Based on our extensive research we have found these to be the best Linux Ethernet adapters.

1. Anker 3-Port USB 3.0 HUB with 10/100/1000 Gigabit Ethernet Adapter

Looking for a Gigabit Ethernet adapter for Linux that doubles as a USB 3.0 hub? The Anker 3-Port USB 3.0 HUB is your best bet. Why? Not only will it give your Linux computer a stellar ethernet connection of up to 1 Gbps, but it also has 3 USB 3.0 ports with a very fast data transfer rate.

There are a lot of excellent USB ethernet adapter/USB hub combos out there on the market. However, Anker takes the cake with theirs by promising first-class Linux support. Linux users will be able to plug the device in and get going with no need to install third-party drivers.

In our testing, we found that the Anker 3-Port USB 3.0 HUB with 10/100/1000 Gigabit Ethernet Adapter worked very well on Linux, averaging connection speeds of 940 Mbps – 1 Gbps. We also found that data transfers were speedy, but the transfer rates depend on the size of the data.

Pros

  • Has a built-in USB hub with 3 USB 3.0 ports.
  • USB ports can transfer data at up to 5 Gbps.
  • The ethernet port is backward compatible with USB 2.0 ports.
  • Reasonable price tag.
  • The green LED on the device indicates that everything is functioning correctly.
  • The USB cord is detachable.
  • The network connector has LED lights to indicate activity.
  • Network chipset supports Linux out of the box with no drivers required.

Cons

  • Network throughput stays closer to 900 Mbps rather than the advertised 1 Gbps most of the time.

2. AmazonBasics USB 2.0 to 10/100 Ethernet Port LAN Internet Network Adapter

There are a lot of USB 3.0 ethernet adapters out there for Linux, and they’re all excellent products, but not everyone is in the market for these devices. As strange as it sounds, people still purchase USB 2.0 ethernet adapters, especially Raspberry Pi enthusiasts.

AmazonBasics has a reputation for creating affordable products with exceptional quality, and the AmazonBasics USB 2.0 Ethernet Port LAN Internet Network Adapter is no different. Despite the modest price tag, it offers up impressive transfer rates of up to 100 Mbps, which is pretty good for basic network connectivity on Linux.

Like many other USB networking adapters, the AmazonBasics USB 2.0 ethernet adapter is plug-n-play, so it has excellent Linux support right out of the box. For this reason, it’ll make an excellent network adapter for a Raspberry Pi, or even an old computer that needs ethernet connectivity.

In our testing of the AmazonBasics USB 2.0 Ethernet Port LAN Internet Network Adapter, we found it worked quite well on the Raspberry Pi operating system Raspbian, as well as most conventional Linux operating systems. It kept a steady network transfer rate up to 480 Mbps.

Pros

  • Network connectivity up to 480 Mbps.
  • Works well on Raspberry Pi 1, 2, and 3 thanks to the 2.0 USB support.
  • Incredibly inexpensive.
  • The network connector has LED lights to indicate activity.
  • Network chipset supports Linux out of the box with no drivers required.

Cons

  • Often stays under 480 Mbps.
  • The USB cable is not detachable.

3. TP-Link USB to Ethernet Adapter

TP-Link is well-known for its networking equipment. Consistently, they create products that are well-supported on Linux. The TP-Link USB to Ethernet Adapter is no different. Out of the box, it comes with first-class Linux support; no drivers required.

The TP-Link USB to Ethernet Adapter is USB 3.0 and supports a transfer rate of up to 1 Gbps. It also supports a network transfer rate of 10-100 Mpbs in USB 2.0 ports and is even backward compatible with USB 1.1 ports.

In using the TP-Link USB to Ethernet Adapter on Linux, we found that it maintained a stable network connection on all types of USB ports, though USB 3.0 ports performed the best.

Pros

  • The USB cable is foldable.
  • The indicator light on the top of the device shows network activity.
  • Network chipset supports Linux out of the box with no drivers required.
  • Incredibly inexpensive.
  • Backward compatible with USB 2.0 and 1.1 ports.

Cons

  • The ethernet port does not have the standard yellow/green activity LED lights.

4. UGREEN Network Adapter

The UGREEN Network Adapter is an affordable ethernet adapter for Linux, Mac, Windows, Android, and even the Nintendo Switch. It is a USB 3.0 device and can deliver network speeds at a maximum rate of 1 Gbps. However, it is also possible to use the device on USB 2.0 ports, though the network transfer rate will suffer significantly.

The UGREEN Network Adapter is a plug-n-play device, meaning it will work on virtually every Linux operating system out of the box, with drivers already included in the Linux kernel. So, If you’re in the market for a good, affordable USB 3.0 ethernet adapter that works well on Linux, the UGREEN Network Adapter is one of the best and deserves your attention.

In our testing, we found the UGREEN Network Adapter had a consistent network transfer rate of 900 Mpbs to 1 Gpbs on USB 3.0. On USB 2.0 ports, the transfer rate was much lower, but still very much usable.

Pros

  • Supports both USB 3.0 and USB 2.0 connectivity.
  • Works with a myriad of devices aside from Linux, including the Nintendo Switch gaming console.
  • The network connector has LED lights to indicate activity.
  • Network chipset supports Linux out of the box with no drivers required.
  • Relatively inexpensive.

Cons

  • The USB cable is not detachable.

Conclusion

In this list, we talked about 4 excellent USB ethernet adapters that work very well with Linux. Though this list is not definitive. What USB ethernet adapter do you use on your Linux system? Sound off in the comment section below!

The post 4 Best USB Ethernet Adapters for Linux appeared first on AddictiveTips.