Prince Yadav

Prince Yadav

198 Articles Published

Articles by Prince Yadav

Page 7 of 20

How to Convert Images to WebP Format in Linux?

Prince Yadav
Prince Yadav
Updated on 27-Jul-2023 3K+ Views

In today's digital age, images play a vital role in websites and various digital projects. But, the larger the image size, the longer it takes to load, leading to a poor user experience. You probably want to know the solution to this. Fortunately, Google has developed the WebP image format, which offers superior compression and quality compared to traditional image formats like JPEG and PNG. In this article, we will delve into how you can convert images to the WebP format on Linux using the WebP tools. By converting your images to WebP format, you can significantly reduce their file ...

Read More

How to Control Systemd Services on Remote Linux Server?

Prince Yadav
Prince Yadav
Updated on 27-Jul-2023 719 Views

As Linux users and administrators, we are responsible for managing services on remote Linux servers, which could include web servers like Apache or Nginx, or database servers like MySQL or PostgreSQL. To effectively manage these services, we need to have a strong understanding of the underlying system and service manager for Linux - systemd. Systemd is a robust and feature-rich system and service manager designed for Linux-based operating systems. It takes care of managing the initialization and termination of services, tracks system processes, and oversees system resources. It is widely acquired as the default system and service manager in many ...

Read More

Deprecated Linux Networking Commands and Their Replacements

Prince Yadav
Prince Yadav
Updated on 26-Jul-2023 700 Views

Linux is a very popular operating system among developers and system administrators due to its strong and robust command-line interface (CLI). However, some of the networking commands have become outdated over time, making way for newer and more efficient options. In this article, we'll have a look at some of the deprecated commands and their new modern-day replacements to help you keep up with your Linux networking configurations. In this tutorial, we'll go through each of the deprecated commands and their corresponding substitutions. We'll also provide examples of how to use the new commands. By the end of this article, ...

Read More

Analyze Disk Usage in Linux Using Dutree

Prince Yadav
Prince Yadav
Updated on 26-Jul-2023 367 Views

When managing our Linux systems, one of the most crucial things to consider is how we manage our disk space. Many of us are not aware of this, As we accumulate files and directories on our system, it's easy to lose track of what's taking up space and how to optimize our disk usage. But don't worry, that's where dutree comes in handy! In this article, we'll look into dutree in detail. We'll cover what it is, how to use it, and what benefits it offers for analyzing disk usage in Linux systems. Whether you're a Linux beginner or an ...

Read More

Cr3dOv3r – Credential Reuse Attack Tool in Kali Linux

Prince Yadav
Prince Yadav
Updated on 26-Jul-2023 365 Views

In this tutorial, we will explore a powerful tool called Cr3dOv3r, which is used for conducting credential reuse attacks. Cr3dOv3r is specifically designed for Kali Linux, a popular Linux distribution widely used for penetration testing and ethical hacking purposes. In this article, we will delve into the functionalities and usage of Cr3dOv3r, providing step-by-step instructions along with code snippets and their explanations. By the end of this tutorial, you will have a solid understanding of how to leverage Cr3dOv3r to identify potential credential reuse vulnerabilities and enhance the security of your systems. Installation and Setup of Cr3dOv3r To begin, let's ...

Read More

DEBUGFS Command to Show File Creation Times in Linux

Prince Yadav
Prince Yadav
Updated on 26-Jul-2023 627 Views

The DEBUGFS command is a powerful utility in Linux that grants access to the file system of a block device. One of its notable features is its ability to reveal the creation time of a file, which cannot be easily obtained through typical Linux commands. This piece of information is stored in a data structure known as the inode, which houses diverse particulars about the file, including its creation time. To obtain the data using the DEBUGFS command accesses the inode of the file and provides a comprehensive view of the file system. This command facilitates the identification of the ...

Read More

How to Connect Wi-Fi from Linux Terminal Using Nmcli Command?

Prince Yadav
Prince Yadav
Updated on 26-Jul-2023 3K+ Views

If you are a Linux user and wish to connect to a Wi-Fi network from a terminal. Although it may seem scary, it is actually a simple process using the Nmcli command. In this article, I will introduce you to the steps of connecting Wi-Fi from a Linux terminal using Nmcli commands in a simple and easy-to-understand way. So let’s get started! First, if we want to check the name of our network device we can simply do that by running the following command − $ iw dev You’ll get the output kind of this by running the command − ...

Read More

Web Scraping Financial News Using Python

Prince Yadav
Prince Yadav
Updated on 26-Jul-2023 1K+ Views

Data extraction is vital in the digital age because of the wealth of online information. Extracting data from webpages through a process known as web scraping has grown in popularity for a variety of uses. For example, web scraping can be very helpful for gathering and analyzing financial news. One can automate the extraction of financial news from many sources, get insights, and make judgments by using Python, a flexible and potent computer language. The importance of financial news in today's frantic markets cannot be overstated. For their portfolio decisions, traders, investors, and analysts depend on current information. One can ...

Read More

How to Brute-Force SSH in Kali Linux?

Prince Yadav
Prince Yadav
Updated on 26-Jul-2023 5K+ Views

Secure remote access is essential for both organizations and individuals in the connected world of today. For secure network communication and remote system administration, SSH (Secure Shell) has gained popularity. It is crucial to understand that SSH servers can be subject to brute-force attacks that aim to jeopardize their security. This article gives a general overview of brute-forcing SSH in Kali Linux, a well-known system for security analysis and penetration testing. Network administrators can strengthen their defenses and guarantee the integrity of their SSH servers by comprehending the mechanics of these attacks, taking ethical considerations into account, and putting mitigation ...

Read More

How to Block USB Storage Devices in Linux Servers?

Prince Yadav
Prince Yadav
Updated on 26-Jul-2023 4K+ Views

USB storage devices have become ubiquitous in our technology-driven world, but they also pose a significant security threat to organizations. Attackers can exploit these devices to introduce malware, steal sensitive data, or gain unauthorized access to a network. To protect Linux servers against such attacks, administrators can take proactive measures by blocking USB storage devices. This article will delve into the various ways to accomplish this, including the benefits of each approach and the necessary steps to implement them. After reading this article, readers will be equipped with the knowledge to disable USB storage devices and secure their Linux servers. ...

Read More
Showing 61–70 of 198 articles
« Prev 1 5 6 7 8 9 20 Next »
Advertisements