
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1354 Articles for Open Source

4K+ Views
Secure remote access is essential for both organizations and individuals in the connected world of today. For secure network communication and remote system administration, SSH (Secure Shell) has gained popularity. It is crucial to understand that SSH servers can be subject to brute-force attacks that aim to jeopardize their security. This article gives a general overview of brute-forcing SSH in Kali Linux, a well-known system for security analysis and penetration testing. Network administrators can strengthen their defenses and guarantee the integrity of their SSH servers by comprehending the mechanics of these attacks, taking ethical considerations into account, and putting mitigation ... Read More

4K+ Views
USB storage devices have become ubiquitous in our technology-driven world, but they also pose a significant security threat to organizations. Attackers can exploit these devices to introduce malware, steal sensitive data, or gain unauthorized access to a network. To protect Linux servers against such attacks, administrators can take proactive measures by blocking USB storage devices. This article will delve into the various ways to accomplish this, including the benefits of each approach and the necessary steps to implement them. After reading this article, readers will be equipped with the knowledge to disable USB storage devices and secure their Linux servers. ... Read More

3K+ Views
Process scheduling is a critical aspect of operating systems as it ensures the efficient execution of tasks. Understanding process states and transitions is essential for effective management and optimization. In this article, we will delve deeper into the concept of process states and transitions in a UNIX process, highlighting their significance in operating systems. The Process Scheduler Definition and Purpose In the functioning of an operating system. The process scheduler plays a pivotal role. Its principal responsibility includes monitoring and steering process execution. Additionally it aims to amplify system performance optimize resource utilization while curtailing response time. By effectively managing ... Read More

2K+ Views
On an operating system based on Linux, the Linux terminal is a potent tool for carrying out commands and managing various tasks. Although some people might find it intimidating, personalizing the terminal can improve the user experience and give the Linux environment a more unique feel. In this article, we'll look at how to display personalized welcome messages on the Linux terminal, giving users the opportunity to make each time they open a terminal session feel special and warm. Customizing the Bashrc File Every time a fresh terminal session is opened, a script in the Bashrc file is run. It ... Read More

554 Views
Linux is a very popular operating system among developers and system administrators due to its strong and robust command-line interface (CLI). However, some of the networking commands have become outdated over time, making way for newer and more efficient options. In this article, we'll have a look at some of the deprecated commands and their new modern-day replacements to help you keep up with your Linux networking configurations. In this tutorial, we'll go through each of the deprecated commands and their corresponding substitutions. We'll also provide examples of how to use the new commands. By the end of this article, ... Read More

513 Views
The DEBUGFS command is a powerful utility in Linux that grants access to the file system of a block device. One of its notable features is its ability to reveal the creation time of a file, which cannot be easily obtained through typical Linux commands. This piece of information is stored in a data structure known as the inode, which houses diverse particulars about the file, including its creation time. To obtain the data using the DEBUGFS command accesses the inode of the file and provides a comprehensive view of the file system. This command facilitates the identification of the ... Read More

4K+ Views
The 'curl' command is a versatile tool in the Linux environment, enabling data transfers to and from servers utilizing a variety of protocols including HTTP, FTP, and SMTP. This command-line utility is renowned for its robustness and versatility, as it can be utilized for various tasks, including sending HTTP requests, retrieving files, and uploading data. Join us as we delve into the fundamentals of utilizing the 'curl' command in Linux, comprehending its varied options and applications. 1. To Check the Curl Version The "curl --version" command in the Linux operating system displays key information about the version of the 'curl' ... Read More

244 Views
In this tutorial, we will explore CRLFuzz, a powerful Linux tool written in Go that allows us to scan and identify CRLF (Carriage Return Line Feed) vulnerabilities. CRLF vulnerabilities occur when web applications mishandle the line termination characters, leading to potential security risks such as HTTP response splitting, cross-site scripting (XSS), and session hijacking. By using CRLFuzz, we can effectively scan for these vulnerabilities and strengthen the security of our web applications. Throughout this tutorial, we will cover the installation process, demonstrate the usage of CRLFuzz with various command-line options, and explain the significance of the code snippets and their ... Read More

2K+ Views
In this tutorial, we will explore the process of creating dialog boxes using the Dialog tool in Linux. Dialog is a command-line utility that allows developers to easily incorporate interactive dialog boxes into their shell scripts or applications. These dialog boxes provide a user-friendly interface for displaying information, receiving input, and making selections. By using the Dialog tool, we can enhance the interactivity and usability of our Linux programs. Throughout this tutorial, we will walk through the steps required to install and use the Dialog tool effectively. We will start with the installation process, explore different types of dialog boxes ... Read More

281 Views
In this tutorial, we will explore a powerful tool called Cr3dOv3r, which is used for conducting credential reuse attacks. Cr3dOv3r is specifically designed for Kali Linux, a popular Linux distribution widely used for penetration testing and ethical hacking purposes. In this article, we will delve into the functionalities and usage of Cr3dOv3r, providing step-by-step instructions along with code snippets and their explanations. By the end of this tutorial, you will have a solid understanding of how to leverage Cr3dOv3r to identify potential credential reuse vulnerabilities and enhance the security of your systems. Installation and Setup of Cr3dOv3r To begin, let's ... Read More