What is Open-Source
Open-source is a term used to describe computer programs that have source code that’s available to study, modify, and share. Open-source software can be used for any purpose, studied and…
Cyber Security with a flare
Open-source is a term used to describe computer programs that have source code that’s available to study, modify, and share. Open-source software can be used for any purpose, studied and…
Apache is open-source web server software that is developed and maintained by the Apache Software Foundation and is available for free. It’s fast, reliable, and secure and runs on 31%…
Setting up cron jobs in Unix, Solaris & Linux Cron is a Unix, Solaris, Linux utility that allows tasks to be automatically run in the background at regular intervals by…
How do you remove a password from a .key file using OpenSSL. You will be prompted for your original password, so enter that first then the new key will be…
Using the passwd command, you can change a user’s password and settings related to password expiry. There are two possible ways to achieve this, as described in detail, below. Using…
In this tutorial, you will learn: The default Ubuntu firewall is ufw, with is short for “uncomplicated firewall.” Ufw is a frontend for the typical Linux iptables commands, but it…
SSH is the most secure means of connecting to Linux servers remotely. And one of the common errors encountered while using SSH is the “ssh: connect to host port 22:…
How does it work? Netplan reads network configurations from /etc/netplan/*.yaml, written by administrators, installers, cloud image instantiations, or other OS deployments. During early boot, Netplan generates backend-specific configuration files in…
Package Description The NET-3 networking toolkit Quick Install Instructions of net-tools on Ubuntu Server. It’s Super Easy! Simply Copy (CTL-C) to copy the command and paste (CTL-V) it into your…
Before attacking any website, it’s critical to do good reconnaissance. A few minutes of recon can save you hours on a hack. Simply trying various attacks without first finding which…