TCP vs UDP
Here, we will compare these two protocols’ main characteristics, and we will look at TCP Protocol (Transmission Control Protocol) and UDP Protocol (User Datagram Protocol). This comparison is very important…
What is SSH?
What is SSH? SSH, or Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an…
How To Use Proxy chains with Kali Linux
Proxy chains are open source software for Linux systems and come pre-installed with Kali Linux, the tool redirects TCP connections through proxies like TOR, SOCKS, and HTTP (S), allowing us…
Definition – Web Server
Web servers use HTTP (Hypertext Transfer Protocol) and other protocols to respond to client requests made over the Internet. The main job of a web server is to display website…
Crontab – Quick Reference
Setting up cron jobs in Unix, Solaris & Linux Cron is a Unix, Solaris, Linux utility that allows tasks to be automatically run in the background at regular intervals by…
How to enable/disable the firewall on Ubuntu 20.04 LTS
In this tutorial, you will learn: The default Ubuntu firewall is ufw, with is short for “uncomplicated firewall.” Ufw is a frontend for the typical Linux iptables commands, but it…
How To Install “net-tools” Package on Ubuntu / Debian
Package Description The NET-3 networking toolkit Quick Install Instructions of net-tools on Ubuntu Server. It’s Super Easy! Simply Copy (CTL-C) to copy the command and paste (CTL-V) it into your…
How to Find Any Website’s Vulnerabilities with Nikto
Before attacking any website, it’s critical to do good reconnaissance. A few minutes of recon can save you hours on a hack. Simply trying various attacks without first finding which…