Who should read this article? Everyone who is interested in computer security and computer networking. Introduction If you run a network small or big, you need a flexible and productive way to monitor network traffic. You need to provide security to machines connected to your network, especially if you have a wi-fi network. Monitoring the […]
Nowadays, our personal computer is not only a work tool, it is also our private space where we store our little secrets. Protecting our personal data from praying eyes should be one of our top priorities. People use cryptography or encryption to hide their data, but they forget that cryptography does not hide data from […]
“I am having problems in connecting the Galaxy Tab to Ubuntu via USB cable.”; This is a common question around the web and specially in android forums. Sometimes you need to transfer files from your computer to your android device and vice versa.
If you have lot of developers or programmers who access your servers frequently in your company and if you wanna to keep an eye on what data they are accessing, what commands they are issuing, how long they have been accessing servers and how much system resources are consumed by them, then psacct or acct […]
This is a simple useful script which I learned from “Coding For Penetration Testers” book. It is used to check if a host is alive or not and echoes on user screen a message with the results of the ping command, if the host is up it informs the user “HOST IS UP” with the […]
Now that you know what netcat is , it is time for some basic operations and real life tasks with the TCP/IP swiss army knife.Linux distributions come with netcat already compiled and installed but I will cover how
What is htop ? htop is a Linux tool divided into three section ( CPU and Memory usage information, Load Average Uptime and View of Processes) which allows real time monitoring of the processes. It was created to replace the ‘top’ command line unix utility and it is much easier to use for simple and […]