Deprecated Linux Networking Commands and Their Replacements

Prince Yadav
Updated on 26-Jul-2023 16:05:49

606 Views

Linux is a very popular operating system among developers and system administrators due to its strong and robust command-line interface (CLI). However, some of the networking commands have become outdated over time, making way for newer and more efficient options. In this article, we'll have a look at some of the deprecated commands and their new modern-day replacements to help you keep up with your Linux networking configurations. In this tutorial, we'll go through each of the deprecated commands and their corresponding substitutions. We'll also provide examples of how to use the new commands. By the end of this article, ... Read More

Analyze Disk Usage in Linux Using duTree

Prince Yadav
Updated on 26-Jul-2023 16:04:17

334 Views

When managing our Linux systems, one of the most crucial things to consider is how we manage our disk space. Many of us are not aware of this, As we accumulate files and directories on our system, it's easy to lose track of what's taking up space and how to optimize our disk usage. But don't worry, that's where dutree comes in handy! In this article, we'll look into dutree in detail. We'll cover what it is, how to use it, and what benefits it offers for analyzing disk usage in Linux systems. Whether you're a Linux beginner or an ... Read More

Cr3dov3r: Credential Reuse Attack Tool in Kali Linux

Prince Yadav
Updated on 26-Jul-2023 16:02:22

332 Views

In this tutorial, we will explore a powerful tool called Cr3dOv3r, which is used for conducting credential reuse attacks. Cr3dOv3r is specifically designed for Kali Linux, a popular Linux distribution widely used for penetration testing and ethical hacking purposes. In this article, we will delve into the functionalities and usage of Cr3dOv3r, providing step-by-step instructions along with code snippets and their explanations. By the end of this tutorial, you will have a solid understanding of how to leverage Cr3dOv3r to identify potential credential reuse vulnerabilities and enhance the security of your systems. Installation and Setup of Cr3dOv3r To begin, let's ... Read More

Web Scraping Without Getting Blocked

Prince Yadav
Updated on 26-Jul-2023 16:02:12

488 Views

Python has established itself as one of the most popular programming languages due to its versatility and ease of use. One of the areas where Python truly shines is web scraping, a technique used to extract data from websites. Whether you need to gather information for research, build a data−driven application, or monitor competitors, Python provides powerful libraries and tools to facilitate web scraping. However, web scraping comes with its own set of challenges, one of which is the risk of getting blocked by websites. In this tutorial, we will delve into the world of web scraping and discuss effective ... Read More

Debugfs Command to Show File Creation Times in Linux

Prince Yadav
Updated on 26-Jul-2023 16:01:20

571 Views

The DEBUGFS command is a powerful utility in Linux that grants access to the file system of a block device. One of its notable features is its ability to reveal the creation time of a file, which cannot be easily obtained through typical Linux commands. This piece of information is stored in a data structure known as the inode, which houses diverse particulars about the file, including its creation time. To obtain the data using the DEBUGFS command accesses the inode of the file and provides a comprehensive view of the file system. This command facilitates the identification of the ... Read More

Difference Between Normal Processor and AI Processor

Manish Kumar Saini
Updated on 26-Jul-2023 15:59:21

4K+ Views

In IT and computing field, the processor is one of the most essential components of a computing system. Processors are being upgraded every day. Read this article to find out more about normal processors and AI (Artificial Intelligence) processors and how they are different from each other. The fundamental difference between a normal processor and an AI processor is that a normal processor is a general-purpose processor used to perform general computing tasks, while AI processors are special purpose processors used to perform specialized AI and Machine Learning tasks. What is a Normal Processor? A Normal Processor, also called ... Read More

Connect Wi-Fi from Linux Terminal using nmcli Command

Prince Yadav
Updated on 26-Jul-2023 15:57:29

3K+ Views

If you are a Linux user and wish to connect to a Wi-Fi network from a terminal. Although it may seem scary, it is actually a simple process using the Nmcli command. In this article, I will introduce you to the steps of connecting Wi-Fi from a Linux terminal using Nmcli commands in a simple and easy-to-understand way. So let’s get started! First, if we want to check the name of our network device we can simply do that by running the following command − $ iw dev You’ll get the output kind of this by running the command − ... Read More

Difference Between MS Word and MS Excel

Manish Kumar Saini
Updated on 26-Jul-2023 15:57:15

5K+ Views

MS Word and MS Excel are two widely used software applications in offices. MS Word and MS Excel both are a part of the Microsoft Office Suite, developed by Microsoft Corporation. However, they are completely different from each other in terms of their primary function. MS Word is a word processing tool used for creating and editing text-based documents like letter, reports, etc.; whereas MS Excel is a spreadsheet tool used to organize and analyze data with the help of several mathematical tools like formula, chart, pivot tables, etc. Read this article to learn more about MS Word and ... Read More

Web Scraping Financial News Using Python

Prince Yadav
Updated on 26-Jul-2023 15:57:07

1K+ Views

Data extraction is vital in the digital age because of the wealth of online information. Extracting data from webpages through a process known as web scraping has grown in popularity for a variety of uses. For example, web scraping can be very helpful for gathering and analyzing financial news. One can automate the extraction of financial news from many sources, get insights, and make judgments by using Python, a flexible and potent computer language. The importance of financial news in today's frantic markets cannot be overstated. For their portfolio decisions, traders, investors, and analysts depend on current information. One can ... Read More

Brute Force SSH in Kali Linux

Prince Yadav
Updated on 26-Jul-2023 15:53:56

5K+ Views

Secure remote access is essential for both organizations and individuals in the connected world of today. For secure network communication and remote system administration, SSH (Secure Shell) has gained popularity. It is crucial to understand that SSH servers can be subject to brute-force attacks that aim to jeopardize their security. This article gives a general overview of brute-forcing SSH in Kali Linux, a well-known system for security analysis and penetration testing. Network administrators can strengthen their defenses and guarantee the integrity of their SSH servers by comprehending the mechanics of these attacks, taking ethical considerations into account, and putting mitigation ... Read More

Advertisements