This Linux tool maps your online footprint in minutes

https://static0.makeuseofimages.com/wordpress/wp-content/uploads/wm/2025/11/scanning-your-online-info-with-theharvester.jpg

Your digital footprint is often larger than you think. It includes all the emails you’ve sent, subdomains you’ve created, and the services you signed in to, not to mention the alarming amount of information Google knows about you. In many cases, this data is visible, and mapping it takes just a few minutes. Certain tools collect public data, revealing exactly what anyone can see about you online. This practice is known as Open Source Intelligence (OSINT). The thing is that if you can do it, so can anyone else.

theHarvester is one of the most easily accessible tools for this. With the right commands, it gathers data from search engines and public repositories. It even accesses security APIs, revealing hosts, emails, and subdomains you forgot about. I got my hands on this tool, and it taught me how exposed we can be.

OS

Linux

Price model

Free

theHarvester is a tool for Open Source Intelligence. It gathers subdomain names, e-mail addresses, virtual hosts, open ports or banners from public locations. 

 

Setting up theHarvester

Even though theHarvester may sound like a specialized cybersecurity tool (it comes preinstalled on the pentesting-focused distro, Kali Linux), I use it on Linux Mint, and installation is quite easy. You only need to clone theHarvester from its GitHub repository to guarantee you have the latest version and all current APIs and modules.

  1. Launch your terminal and run the commands below:

     sudo apt install git python3-venv -y

    git clone https://github.com/laramies/theHarvester.git

    cd theHarvester

    python3 -m venv venv
    source venv/bin/activate

    pip install .
  2. After the installation finishes, run the command below to confirm it is working:

    theHarvester -h

You should see theHarvester’s menu as confirmation that it has been properly installed.

theHarvester obtains publicly available information using DuckDuckGo, CRT.sh, CertSpotter, DNSDumpster, VirusTotal, and other certificate and threat-intel feeds. You can integrate free API keys for Shodan or Hunter.io by directly adding them to theHarvester’s api-keys.yaml file. This will give your results a boost, even though the tool is still very capable without this upgrade.

Running your first scan

Mapping what the internet already knows about you

Now that you’re set up, it’s time to discover what your online footprint looks like. To start, launch the terminal in theHarvester’s folder and run the command below, replacing example.com with a test domain or an actual one.

theHarvester.py -d example.com -b all -l 100

You can also run the command below from a general terminal to launch theHarvester.

Using the -b all flag in the command above lets theHarvester search in all available data sources, and -l 100 will limit the results so they’re readable.

Shortly, results will appear in the terminal. They typically contain emails, subdomains, hostnames, IP addresses, and sources. When I ran this search on a personal domain, I was surprised to see the amount of personal information I had floating on the internet—information anyone may find from public sources.

Running it on a domain you manage would probably reveal old emails connected to accounts you’ve forgotten and subdomains for test environments you no longer run. It does all this without invading privacy or bypassing security.

Making sense of the results

Understanding emails, subdomains, and digital exposure

The amount of information in the results can be intimidating; once you know what to look for, interpreting it becomes straightforward. The sections are different parts of your digital map. The Emails section appears first, showing publicly exposed contact points. For a company, you may see addresses such as support@domain.com, info@domain.com, or individual employee names. These details can become a weapon for attackers to send phishing emails or to identify hierarchy within an organization. For an individual, if the results show old emails, it should serve as a wake-up call to close those accounts or take steps to limit their online visibility.

Subdomains are another element to look out for. If the results return entries similar to test.example.com or oldblog.example.com, they can indicate forgotten servers or outdated sites. Unattended subdomains run on separate endpoints and can serve as entry points for attackers. You should clean them up or redirect them to reduce the risks of exposure.

The Hosts and IP Addresses section lists IP addresses and hosts. They can reveal outdated infrastructure and show where domains are hosted. However, in all this, the bigger picture is that what you consider hidden is, in fact, publicly available and not that difficult to retrieve.

Simple ways to tighten your digital security right now

It’s unsettling to see your digital footprint laid out in theHarvester’s results, but it’s good to have this awareness. It gives you an idea of how to act to shrink it. A drastic approach can be removing yourself entirely from the internet.

However, a less aggressive starting point is subdomain hygiene. Disable or delete unused accounts and decommission or secure unused subdomains/staging environments. Every deactivated subdomain is one less risk.

Also, tackle email exposure. You may use email aliases for addresses that are easily searchable. I personally use aliases for almost everything, especially online shopping. So rather than afam@yourdomain.com, you use newsletter@yourdomain.com. This will shield your primary inbox from being listed in public databases.

Last but not least, conceal domain registration details. A WHOIS lookup service can show if your personal information is publicly visible; if so, enable domain privacy protection via your registrar.

The bigger picture

TheHarvester is a mirror that displays exactly what someone may find about you online if they know where to look. For me, it started as a simple scan but quickly became a realization that the web remembers too much—connections, emails, and forgotten pages.

Awareness is key—you can’t take control if you’re uninformed. While this tool is great for managing an organization’s domain, it’s also useful for personal sites. Regular checks are a small habit that ensures your online presence is secure.

MakeUseOf

Ruger Introduces New American Gen II Patrol Rifles

https://cdn-fastly.thefirearmblog.com/media/2025/11/07/21111/post.jpg?size=720×845&nocrop=1

Ruger’s family of American bolt action rifles continues to grow. The latest sub-model is the   Patrol variant. Let’s take a look at what sets these rifles apart from the rest of the range.

Ruger @ TFB:

The Ruger American Gen II Patrol is a precision and tactical-oriented development from the other Gen II models. Rather than the bolder stock and Cerakote patterns applied on other models like the Standard or Predator, the Patrol has a black stock and black Cerakote finish. The barrel is also a heavier contour without flutes. It also omits the brake included on other versions of the gun, given that the Patrol will almost certainly be used with a suppressor. A black Cerakote finish on the barrel and receiver round out the Patrol model.

Ruger also looks to more tactical options for cartridge options. Models available at launch include:

  • 5.56 NATO, feeding from AR mags
  • 6mm ARC, feeding from AR mags
  • 308 Winchester, feeding from AICS mags

All three of those options feature 16-inch threaded barrels. The MSRP for all three is $729. These models are available from distributors now.

Long action models in .300 Win Mag and 7mm PRC are also forthcoming but specs are not yet available. A .338 ARC model will be forthcoming as well.

All images from Ruger

From the manufacturer:

“Generation II Patrol models feature a bull contour, cold hammer-forged barrel that helps to mitigate recoil and a Graphite Black Cerakote barreled action. The black stock is textured with gray splatter for excellent grip and control in the field.”

The Firearm Blog

Texas Sues Roblox For Allegedly Failing To Protect Children On Its Platform

Texas is suing Roblox, alleging the company misled parents about safety, ignored online-protection laws, and allowed an environment where predators could target children. Texas AG Ken Paxton said the online game platform is "putting pixel pedophiles and profits over the safety of Texas children," alleging that it is "flagrantly ignoring state and federal online safety laws while deceiving parents about the dangers of its platform." The Verge reports: The lawsuit’s examples focus on instances of children who have been abused by predators they met via Roblox, and the activities of groups like 764 which have used online platforms to identify and blackmail victims into sexually explicit acts or self harm. According to the suit, Roblox’s parental controls push only began after a number of lawsuits, and a report released last fall by the short seller Hindenburg that said its "in-game research revealed an X-rated pedophile hellscape, exposing children to grooming, pornography, violent content and extremely abusive speech." Eric Porterfield, Senior Director of Policy Communications at Roblox, said in a statement: "We are disappointed that, rather than working collaboratively with Roblox on this industry-wide challenge and seeking real solutions, the AG has chosen to file a lawsuit based on misrepresentations and sensationalized claims." He added, "We have introduced over 145 safety measures on the platform this year alone."


Read more of this story at Slashdot.

Slashdot

Texas AG Ken Paxton sues Roblox over alleged child safety lapses

Texas Attorney General Ken Paxton has filed a lawsuit against Roblox, accusing it of ignoring state and federal safety laws. In his announcement on X, Paxton said the children have been “repeatedly exposed to sexually explicit content, exploitation and grooming” on the online game platform, because it chose to prioritize “pixel pedophiles and corporate profit” over the safety of children. “Thank you,” Schlep posted in the comments of his announcement. Schlep was a popular Roblox user who was known for staging sting operations à la To Catch a Predator on the platform, which had led to multiple arrests. He was controversially banned from Roblox in August, because he violated the company’s new rule that prohibits “vigilante behavior.”

“We share Attorney General Paxton’s commitment to keeping kids and teens safe online," the company said in a statement. "We are disappointed that, rather than working collaboratively with Roblox on this industry-wide challenge and seeking real solutions, the AG has chosen to file a lawsuit based on misrepresentations and sensationalized claims.”

Roblox has implemented several measures meant to protect children over the past few years. It blocked any user under 13 from being able to play, search or discover any unrated experiences on the platform, and it restricted DMs for that segment of users, as well. It also added an age estimation feature that requires a video selfie for a user to be able to prove that they’re 13 or older. The company intends to roll it out to everyone by the end of this year.

Texas isn’t the only state suing Roblox and accusing it of failing to protect children from predators, though: Kentucky and Louisiana had previously filed their own lawsuits against the company. Louisiana argued that the platform contains user-created experiences with troubling themes, such as “Escape to Epstein Island” and “Diddy Party,” despite the majority of its users being under 16. It also pointed out that it was possible to initiate voice chats within Roblox’s experiences, even between users who weren’t friends, until November 2024. In one instance, a man who was arrested for possession of child sexual abuse materials was discovered to have used voice altering software to pretend to be a young girl in order to exploit children on the platform.

“Roblox must do more to protect kids from sick and twisted freaks hiding behind a screen,” Paxton wrote. “Any corporation that enables child abuse will face the full and unrelenting force of the law.” To note, the Texas AG also previously sued TikTok, alleging that it has insufficient parental controls, as well as Meta and Character.AI for potentially misusing data collected from underage users.

This article originally appeared on Engadget at https://www.engadget.com/texas-ag-ken-paxton-sues-roblox-over-alleged-child-safety-lapses-131500288.html?src=rssEngadget