Prince Yadav

Prince Yadav

198 Articles Published

Articles by Prince Yadav

Page 16 of 20

openSquat – Domain Squatting and Phishing Watchdog

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 428 Views

openSquat is a powerful cybersecurity tool designed to detect domain squatting and phishing attempts. Built in Python, it monitors suspicious domain registrations that could target your brand or organization. Domain squatting involves registering domains similar to legitimate ones to deceive users or profit from brand confusion. openSquat leverages Python modules such as whois, requests, tldextract, and BeautifulSoup to analyze domain information, detect malicious patterns, and provide real-time monitoring capabilities for cybersecurity professionals. Features Domain Monitoring − Continuously tracks specific domains for suspicious changes Squatting Detection − Identifies domains that mimic legitimate brands or trademarks Phishing Analysis ...

Read More

PacVim – A CLI Game to Learn Vim Commands

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 533 Views

PacVim is an innovative CLI game that transforms learning Vim commands into an engaging Pac-Man-style experience. Instead of memorizing commands through traditional methods, players navigate through mazes while collecting pellets that represent different Vim operations, making the learning process both fun and effective. Vim has been a favorite of many programmers and Linux users for years due to its powerful features and flexibility. However, Vim's learning curve has often been a barrier for newcomers. PacVim addresses this challenge by gamifying the learning process, allowing users of all skill levels to master Vim commands through interactive gameplay. How PacVim ...

Read More

How to Brute-Force SSH in Kali Linux?

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 5K+ Views

Secure remote access is essential for both organizations and individuals in today's connected world. For secure network communication and remote system administration, SSH (Secure Shell) has gained popularity. However, SSH servers can be subject to brute-force attacks that aim to compromise their security. This article provides a comprehensive overview of brute-forcing SSH in Kali Linux, a popular system for security analysis and penetration testing. Network administrators can strengthen their defenses and guarantee the integrity of their SSH servers by understanding the mechanics of these attacks, considering ethical implications, and implementing mitigation strategies. Note − This article aims to ...

Read More

Practical Examples of Linux xargs Command

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 1K+ Views

The Linux xargs command is a powerful utility that reads items from standard input and executes commands using those items as arguments. It's particularly useful for automating tasks and processing large numbers of files efficiently. This command helps bridge the gap between commands that produce output and commands that need arguments. The xargs command is especially valuable when working with long lists of items or data, as it simplifies the process of executing commands on multiple items. With xargs, you can perform operations like copy, delete, compress, rename, and count on numerous files with a single command line. ...

Read More

How to Connect Wi-Fi from Linux Terminal Using Nmcli Command?

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 3K+ Views

If you are a Linux user and wish to connect to a Wi-Fi network from a terminal, it may seem intimidating at first, but it is actually a simple process using the nmcli command. This article will guide you through the steps of connecting Wi-Fi from a Linux terminal using nmcli commands in a clear and easy-to-understand way. Prerequisites First, check the name of your network device by running the following command − $ iw dev You'll get output similar to this − phy#0 Interface wlan0 ...

Read More

Shell Script to Validate the Date, Considering Leap Year Rules

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 2K+ Views

In this tutorial, we will explore how to create a shell script that validates dates, taking into account the rules of leap years. We will be using the Linux operating system and the Bash shell scripting language for this purpose. Shell scripting allows us to automate tasks and perform complex operations by writing simple and efficient scripts. We will develop a shell script that prompts the user to enter a date in the format YYYY-MM-DD and then validates whether the entered date is valid or not, considering leap year rules. We will break down the problem into smaller steps ...

Read More

Shell Scripting – How to Send Signal to a Process?

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 1K+ Views

In this tutorial, we will explore how to send signals to processes using shell scripting. Signals are software interrupts that enable communication between processes, allowing the operating system and applications to notify processes about events or request specific actions. Understanding signal handling is essential for effective process management in Unix-like systems. Signals serve various purposes including graceful process termination, handling interrupts, suspending processes, and modifying process behavior. Shell scripts can leverage these signals to control running processes programmatically, making system administration and automation more efficient. Understanding Signals and Their Usage Signals are software interrupts sent to processes ...

Read More

Show System Statistics from /proc Filesystem Using procinfo

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 333 Views

The procinfo command is a powerful Linux utility that reads system statistics from the /proc filesystem and displays them in a user-friendly format. It provides quick access to essential system metrics like CPU usage, memory consumption, and process information, making it an invaluable tool for system administrators and users monitoring system performance. The /proc filesystem is a virtual filesystem that provides real-time information about running processes and system resources. The procinfo command parses this data and presents it in an organized, readable format. Installation Install procinfo using your distribution's package manager − Ubuntu/Debian sudo ...

Read More

TheSpeedX / TBomb – Call and SMS Bomber for Kali Linux

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 40K+ Views

TBomb is a penetration testing tool developed by TheSpeedX for educational and authorized security testing purposes. This tool demonstrates potential vulnerabilities in communication systems by simulating bulk messaging and calling scenarios. Important: This tool should only be used on systems you own or have explicit permission to test, as unauthorized use may violate laws and terms of service. Installation Process To install TBomb on your Kali Linux system, follow these steps − Open a terminal in your Kali Linux environment. Clone the TBomb repository from GitHub − git clone https://github.com/TheSpeedX/TBomb.git ...

Read More

Tips to Manage Docker Containers Using CLI

Prince Yadav
Prince Yadav
Updated on 17-Mar-2026 359 Views

Docker has revolutionized how we create, ship, and deploy applications through lightweight containerization. While Docker provides a graphical interface, the command-line interface (CLI) remains the most powerful tool for efficiently managing containers. This article covers essential CLI tips for Docker container management with practical examples. Installing Docker CLI Before managing Docker containers, ensure Docker CLI is installed on your system. Docker CLI is available for Windows, macOS, and Linux. Visit the official Docker website to download and install the appropriate version for your operating system. Basic Container Operations Starting and Stopping Containers Start a container ...

Read More
Showing 151–160 of 198 articles
« Prev 1 14 15 16 17 18 20 Next »
Advertisements