Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Prince Yadav
Page 16 of 20
openSquat – Domain Squatting and Phishing Watchdog
openSquat is a powerful cybersecurity tool designed to detect domain squatting and phishing attempts. Built in Python, it monitors suspicious domain registrations that could target your brand or organization. Domain squatting involves registering domains similar to legitimate ones to deceive users or profit from brand confusion. openSquat leverages Python modules such as whois, requests, tldextract, and BeautifulSoup to analyze domain information, detect malicious patterns, and provide real-time monitoring capabilities for cybersecurity professionals. Features Domain Monitoring − Continuously tracks specific domains for suspicious changes Squatting Detection − Identifies domains that mimic legitimate brands or trademarks Phishing Analysis ...
Read MorePacVim – A CLI Game to Learn Vim Commands
PacVim is an innovative CLI game that transforms learning Vim commands into an engaging Pac-Man-style experience. Instead of memorizing commands through traditional methods, players navigate through mazes while collecting pellets that represent different Vim operations, making the learning process both fun and effective. Vim has been a favorite of many programmers and Linux users for years due to its powerful features and flexibility. However, Vim's learning curve has often been a barrier for newcomers. PacVim addresses this challenge by gamifying the learning process, allowing users of all skill levels to master Vim commands through interactive gameplay. How PacVim ...
Read MoreHow to Brute-Force SSH in Kali Linux?
Secure remote access is essential for both organizations and individuals in today's connected world. For secure network communication and remote system administration, SSH (Secure Shell) has gained popularity. However, SSH servers can be subject to brute-force attacks that aim to compromise their security. This article provides a comprehensive overview of brute-forcing SSH in Kali Linux, a popular system for security analysis and penetration testing. Network administrators can strengthen their defenses and guarantee the integrity of their SSH servers by understanding the mechanics of these attacks, considering ethical implications, and implementing mitigation strategies. Note − This article aims to ...
Read MorePractical Examples of Linux xargs Command
The Linux xargs command is a powerful utility that reads items from standard input and executes commands using those items as arguments. It's particularly useful for automating tasks and processing large numbers of files efficiently. This command helps bridge the gap between commands that produce output and commands that need arguments. The xargs command is especially valuable when working with long lists of items or data, as it simplifies the process of executing commands on multiple items. With xargs, you can perform operations like copy, delete, compress, rename, and count on numerous files with a single command line. ...
Read MoreHow to Connect Wi-Fi from Linux Terminal Using Nmcli Command?
If you are a Linux user and wish to connect to a Wi-Fi network from a terminal, it may seem intimidating at first, but it is actually a simple process using the nmcli command. This article will guide you through the steps of connecting Wi-Fi from a Linux terminal using nmcli commands in a clear and easy-to-understand way. Prerequisites First, check the name of your network device by running the following command − $ iw dev You'll get output similar to this − phy#0 Interface wlan0 ...
Read MoreShell Script to Validate the Date, Considering Leap Year Rules
In this tutorial, we will explore how to create a shell script that validates dates, taking into account the rules of leap years. We will be using the Linux operating system and the Bash shell scripting language for this purpose. Shell scripting allows us to automate tasks and perform complex operations by writing simple and efficient scripts. We will develop a shell script that prompts the user to enter a date in the format YYYY-MM-DD and then validates whether the entered date is valid or not, considering leap year rules. We will break down the problem into smaller steps ...
Read MoreShell Scripting – How to Send Signal to a Process?
In this tutorial, we will explore how to send signals to processes using shell scripting. Signals are software interrupts that enable communication between processes, allowing the operating system and applications to notify processes about events or request specific actions. Understanding signal handling is essential for effective process management in Unix-like systems. Signals serve various purposes including graceful process termination, handling interrupts, suspending processes, and modifying process behavior. Shell scripts can leverage these signals to control running processes programmatically, making system administration and automation more efficient. Understanding Signals and Their Usage Signals are software interrupts sent to processes ...
Read MoreShow System Statistics from /proc Filesystem Using procinfo
The procinfo command is a powerful Linux utility that reads system statistics from the /proc filesystem and displays them in a user-friendly format. It provides quick access to essential system metrics like CPU usage, memory consumption, and process information, making it an invaluable tool for system administrators and users monitoring system performance. The /proc filesystem is a virtual filesystem that provides real-time information about running processes and system resources. The procinfo command parses this data and presents it in an organized, readable format. Installation Install procinfo using your distribution's package manager − Ubuntu/Debian sudo ...
Read MoreTheSpeedX / TBomb – Call and SMS Bomber for Kali Linux
TBomb is a penetration testing tool developed by TheSpeedX for educational and authorized security testing purposes. This tool demonstrates potential vulnerabilities in communication systems by simulating bulk messaging and calling scenarios. Important: This tool should only be used on systems you own or have explicit permission to test, as unauthorized use may violate laws and terms of service. Installation Process To install TBomb on your Kali Linux system, follow these steps − Open a terminal in your Kali Linux environment. Clone the TBomb repository from GitHub − git clone https://github.com/TheSpeedX/TBomb.git ...
Read MoreTips to Manage Docker Containers Using CLI
Docker has revolutionized how we create, ship, and deploy applications through lightweight containerization. While Docker provides a graphical interface, the command-line interface (CLI) remains the most powerful tool for efficiently managing containers. This article covers essential CLI tips for Docker container management with practical examples. Installing Docker CLI Before managing Docker containers, ensure Docker CLI is installed on your system. Docker CLI is available for Windows, macOS, and Linux. Visit the official Docker website to download and install the appropriate version for your operating system. Basic Container Operations Starting and Stopping Containers Start a container ...
Read More