January 22, 2021

Category: Basics

4 ways to identify your current shell (if it’s bash)
Basics, LinuxNix

4 ways to identify your current shell (if it’s bash)

Introduction Knowing which run you are using on your system is an important piece of information. Your shell determines your login environment to a large extent as it controls which environment variables get exported, your shell prompt etc. On a Linux system it’s almost certain that you will using the bash shell unless the system […]

Read More
4 ways to hide your identity using linux
Basics, LinuxNix

4 ways to hide your identity using linux

Being able to change your IP address and other network information is a useful skill because it will help you access other networks while appearing as a trusted device on those networks. For example, in a denial­-of­-service (DoS) attack, you can spoof your IP so that that the attack appears to come from another source, […]

Read More
Ansible playbook to replace multiple lines in a file
Basics, LinuxNix

Ansible playbook to replace multiple lines in a file

Introduction Commands like sed and awk allow us to harness the power of regular expressions to search for text-based patterns in files and manipulate the matched text as per our requirement. The thing about regular expressions is that they are confusing. To the new Linux user, regular expressions may as well be another language. Although […]

Read More
How To Install Kali Linux in Virtualbox
Basics, LinuxNix, Security

How To Install Kali Linux in Virtualbox

In our previous article, we have discussed about how to download the kali linux image file and how to install virtualbox. Now let’s get you started with the virtual machine. Step 01 : Open Virtualbox VirtualBox should open once it has installed. Now you should be greeted by the VirtualBox Manager Step 02 : Create […]

Read More
Kali Linux : The OS That Hackers Use
Basics, LinuxNix, Security

Kali Linux : The OS That Hackers Use

If you are familiar with cyber security stuff, you must have heard about kali linux. Kali linux is a operating system developed by offensive security and it was specifically targeted for penetration testers. This linux distribution is built on Debian and it comes pre installed with many more security tools. In this guide, we will […]

Read More
How to monitor user activity in Linux with Acct
Basics, LinuxNix

How to monitor user activity in Linux with Acct

Acct is an open source application that we can use to monitor user activity in Linux. This tool comes with the functionality of running in the background and tracking user activity. It also reports what are the system resources are being consumed by the users. In this guide, we will see how to install and […]

Read More
SSH Command explained in 5 simple steps
Basics, LinuxNix

SSH Command explained in 5 simple steps

Secure Shell (SSH) is a network protocol that is used to create a secure encrypted connection between 2 computer systems. Once the connection has been established, the user can do the following tasks on the remote system Execute commands on the server X11 tunneling Port forwarding, and more There are mainly 2 parties involved when […]

Read More