Linux

QuickFetch – Quick System Info Tool : Your Comprehensive Guide To Installation And Configuration

QuickFetch is a streamlined tool designed to efficiently retrieve system information with minimal fuss.

Whether you’re a seasoned developer or a curious tech enthusiast, this guide will walk you through the simple steps to install, configure, and use QuickFetch on your machine.

Dive into the capabilities of QuickFetch and enhance your system’s performance monitoring with ease.

How To Install?

Compile And Install

git clone https://github.com/jakub-swiniarski/quickfetch.git
cd quickfetch
sudo make install

How To Run?

Use this command:

qf

How To Uninstall?

Go inside the cloned repository and run:

sudo make clean uninstall

Configuration

You can configure QuickFetch by editing the source code.

How To Setup CPU Temperature Detection?

Find The CPU Thermal Zone

cat /sys/class/thermal/thermal_zone*/type

Look for x86_pkg_temp (this is your CPU thermal zone).

Example

Counting from 0, x86_pkg_temp is 9th on the list.
Edit config.h:

static const char *cpu_temp = "/sys/class/thermal/thermal_zone9/temp";
Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

Cybersecurity Toolkit – Essential Python Tools For Penetration Testing

Welcome to the Cybersecurity Toolkit, a collection of essential Python tools designed for penetration testing…

1 day ago

i-Haklab : Unleashing The Power Of Termux For Enhanced Cybersecurity

The main objective of the creation of this laboratory is to transport the applications, tools…

1 day ago

Dark FB – A Comprehensive Toolkit For Advanced Facebook Interactions

"Dark FB" is a powerful toolkit designed for those who wish to delve deeper into…

1 day ago

Wifi-Hacking.py : Your Ultimate Guide To Ethical WiFi Penetration Testing

Unlock the potential of ethical hacking with Wifi-Hacking.py, a powerful cybersecurity tool designed to navigate…

2 days ago

THREAT ACTORS – TTPs : Decoding The Digital Underworld Through Comprehensive Mapping

This repository was created with the aim of assisting companies and independent researchers about Tactics,…

2 days ago

MagicDot : Harnessing DOT-To-NT Path Conversion For Rootkit-Like Capabilities

A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path…

2 days ago