Last modified: March 23, 2026

This article is written in: 🇺🇸

Utilities

We will discuss various tools that can be used on Linux systems for tasks such as taking screenshots, recording screens, preparing bootable sticks, and detecting malware. It provides brief explanations of each tool and includes installation and usage instructions.

Taking Screenshots with Scrot

Scrot is a command-line utility for taking screenshots in Linux. It allows you to capture the entire screen, a specific window, or a selected area of the screen. Scrot is available in most Linux distributions, and you can install it using the package manager of your distribution.

To take a screenshot of the entire screen, use the following command:

scrot screenshot.png

This will save the screenshot as a PNG image in the current working directory. If you want to specify a different directory or file name, provide the desired path and file name as an argument:

scrot /path/to/screenshot.png

To take a screenshot of a specific window, use the -u option followed by the window title or ID:

scrot -u "Window Title" screenshot.png

To take a screenshot of a selected area of the screen, use the -s option:

scrot -s screenshot.png

This will allow you to draw a rectangle around the area you want to capture using the mouse.

Scrot also supports a number of additional options, such as -b to include window borders in the screenshot, -d to specify a delay before taking the screenshot, and -e to execute a command after the screenshot is taken. For example, the following command will take a screenshot of the current window with borders, wait for 3 seconds, and then save the screenshot to the Desktop:

scrot -b -d 3 screenshot.png -e 'mv $f ~/Desktop/'

Recording the Screen with Vokoscreen

Vokoscreen is a graphical tool for recording screencasts in Linux. It allows you to capture the entire screen, a specific window, or a selected area of the screen, and also supports the capture of audio and webcam video.

To install Vokoscreen on a Debian-based system, use the following command:

apt install vokoscreen

To start the program, simply run the vokoscreenNG command. This will open the Vokoscreen window, which provides a number of options for configuring the screen recording.

Screenshot from 2022-09-21 11-15-03

To start the recording, click on the "Start" button and select the area of the screen you want to capture. You can also choose to record audio and webcam video, as well as specify a file name and location for the recording. When you are finished, click on the "Stop" button to end the recording.

Preparing a Bootable USB Stick with USBImager

USBImager is a graphical utility for creating bootable USB sticks in Linux. It allows you to write an image file to a USB drive, making it possible to boot a computer from the USB drive. USBImager is lightweight and cross-platform, supporting raw disk images, compressed images, and ISO files. This makes it a versatile choice for creating installation media for Linux distributions and other operating systems.

To install USBImager, download the appropriate package from the official USBImager GitHub releases page and install it using your system's package manager or by extracting the archive.

Screenshot from 2022-09-06 22-47-32

Using USBImager involves a few simple steps:

I. Insert your USB drive and open USBImager.

II. Click the browse button (marked with ...) to select the image file you want to write. This can be an ISO, IMG, or compressed archive containing a disk image.

III. Select the target USB device from the dropdown menu. Make sure to choose the correct device to avoid overwriting data on other drives.

IV. Click the "Write" button to begin writing the image to the USB drive. The progress bar will indicate how far along the process is.

V. Once the write process is complete, safely eject the USB drive. You can now use it to boot a computer from the written image.

USBImager can also read a disk image from a USB device, which is useful for creating backups of bootable drives. To do this, select the USB device, specify an output file name, and click "Read."

For command-line users who prefer a terminal-based approach, the dd command is a common alternative for writing images to USB drives:

sudo dd if=/path/to/image.iso of=/dev/sdX bs=4M status=progress
sync

Replace /dev/sdX with the correct device identifier for your USB drive. The sync command ensures all data has been flushed to the device before removal.

Malware Detection with Maldet

One tool that can be used for malware detection is Maldet (short for Linux Malware Detect). Maldet is an open-source antivirus and malware scanning tool that uses a combination of signature-based and heuristic-based detection methods to identify and remove malware. It is specifically designed to detect and remove malware that targets Linux systems, and is regularly updated with the latest malware definitions.

Installation

To install Maldet on a Debian-based system, use the following commands:

wget http://www.rfxn.com/downloads/maldetect-current.tar.gz
tar xvfz maldetect-current.tar.gz
cd maldetect-2.1.1 && sudo ./install.sh

This will download and extract the latest version of Maldet, and then run the installation script to install the software on the system.

Scanning for malware

To scan for malware on a Linux system using Maldet, use the following command:

maldet --scan-all /path/to/directory

Replace /path/to/directory with the path of the directory you want to scan. You can also use the --scan-all flag to scan the entire system.

For example, to scan the home directory of the current user, use the following command:

maldet --scan-all ~

The scan may take some time, depending on the size of the directory and the number of files it contains. When the scan is complete, Maldet will output a report ID, which can be used to view the scan report and take further action on any infected files that were detected.

Viewing the scan report

To view the scan report for a particular scan, use the following command:

maldet --report ID

Replace ID with the report ID of the scan you want to view. The report will show a list of all the files that were scanned, along with any infected files that were detected.

Quarantining infected files

If Maldet detects any infected files during a scan, you can use the following command to quarantine them:

maldet -q ID

Replace ID with the report ID of the scan you want to quarantine the infected files for. This will move the infected files to a quarantine directory, where they can be safely removed or further examined.

Challenges

  1. Install Scrot on your Linux system and take screenshots of the entire screen, a specific window, and a selected region. Experiment with the delay option (-d) and the execute option (-e) to automate post-screenshot actions such as moving the file to a specific directory. Document the commands you used and the results.
  2. Use Vokoscreen (or vokoscreenNG) to record a short screencast that demonstrates a specific Linux task, such as navigating the file system or editing a configuration file. Experiment with recording settings including audio capture and output format. Compare the resulting file size and quality across different format options.
  3. Download a Linux distribution ISO and use USBImager (or the dd command) to create a bootable USB drive. Boot a computer from the USB drive and verify that the installation media loads correctly. Document each step and explain the precautions necessary to avoid overwriting the wrong drive.
  4. Install Maldet on a test system and perform a full scan of a directory. Review the scan report, and if any files are flagged, practice quarantining them. Explain the difference between signature-based and heuristic-based detection methods that Maldet uses.
  5. Write a shell script that takes a screenshot using Scrot, adds a timestamp to the filename, and saves it to a dedicated screenshots directory. Schedule the script to run automatically at regular intervals using cron and verify that the screenshots are being captured as expected.
  6. Research and install an alternative screenshot tool (such as maim or flameshot) and compare its features with Scrot. Document the strengths and weaknesses of each tool and explain which one you would recommend for different use cases.
  7. Configure Maldet to run automatic scans on a schedule using cron. Set up email notifications so that scan reports are sent to your email address when malware is detected. Test the configuration by placing a test signature file in the scanned directory.
  8. Use the dd command to create a backup image of a USB drive and then restore it to a different drive. Verify the integrity of the restored image by comparing checksums. Discuss scenarios where disk imaging is preferable to file-level backups.
  9. Explore additional Linux utilities for system monitoring and diagnostics (such as htop, ncdu, or neofetch). Install at least two of these tools, use them to gather information about your system, and document their output. Explain how these utilities complement the tools covered in this guide.
  10. Set up a screen recording workflow that captures both video and audio, then use a command-line tool (such as ffmpeg) to trim, compress, or convert the recording to a different format. Document the commands and options you used, and discuss how automating video processing tasks can improve productivity.