Nmap is a popular, powerful and cross-platform command-line network security scanner and exploration tool. It can also help you get an overview of systems that connected your network; you can use it to find out all IP addresses of live hosts, scan open ports and services running on those hosts, and so much more. One
This video shows the historry of most dangerous viruses of the recent past, how it spread between humans and killed millions. watch this video to understand why it’s important to social distance and follow all guidlines of the government in this fuckedup times. Watch this video till the end to understand the importance.
These Bizarre Wormlike Creatures Eat Rock, Poop Sand, And May Even Redesign Rivers Most clams are happy to make their burrow in a nice, soft bed of sand or mud. Not this mollusc. A recently uncovered relative of the shipworm puts the hard into hardcore, chewing holes into rocks and excreting the debris as sand.
Introduction Two-factor authentication (2FA) is an authentication method that requires entering more than one piece of information to successfully log in to an account or device. In addition to entering a username and password combination, 2FA requires the user to enter an additional piece of information such as a one-time password (OTP), like a six-digit
One of the common task we do after installing a Linux system is network configuration. Of course, you can configure network interfaces during the installation time. But, some of you might prefer to do it after installation or change the existing settings. As you know already, you must first know how many interfaces are available
ext3grep is a simple program for recovering files on an EXT3 filesystem. It is an investigation and recovery tool that is useful in forensics investigations. It helps to show information about files that existed on a partition and also recover accidentally deleted files. In this article, we will demonstrate a useful trick, that will help
This site is created only for educational purposes for our students. In this example you see a 100% copy of Facebook page, which looks 100% same, but as soon as you enter your login information, you will be redirected to the real Facebook, but in this proces your information is copied to a local file
Most of the time, you can easily manage your database with web-based tools such as phpMyAdmin. Unfortunately, there are times when you need to restore a large amount of data. This can’t be accomplished through phpMyAdmin because of PHP’s limits (either the maximum time a PHP script can use or the maximum file size upload). Using the MySQL