background preloader


Facebook Twitter

EBS in an hour: Build a Vision instance - FAST - in Oracle Virtualbox. Oracle all books | GRAP IT. Silver Efex Pro 2. Learn Basic Linux Commands - Linux Command Line Tutorial - Udemy. Partitioning - Unallocated space, how to resize /home partition? Kali Linux NetHunter - Kali NetHunter. Free Linux Books. You are here: Home ▶ Linux Linux Succinctly Posted on December 7th, 2014 Linux Succinctly by Jason Cannon will teach you the basics of interacting with Linux, such as viewing and editing files and directories through the command line, and how to modify permissions.

More advanced topics covered include I/O streams, sorting and comparing files and directories, and installing additional software. Linux Kernel Crash Book Posted on October 16th, 2012 “Linux Kernel Crash Book”, by Igor Ljubuncic, starts with crash tools via collection all the way to analysis, plus some extras and general tips.

CentOS 6 Essentials Posted on September 17th, 2012 This “CentOS 6 Essentials” online book is designed to provide detailed information on the use and administration of the CentOS 6 Linux distribution. The Debian Administrator’s Handbook Posted on May 21st, 2012 The Linux Command Line Posted on April 1st, 2012 “The Linux Command Line” by William E. User Mode Linux Posted on March 7th, 2012 Posted on February 2nd, 2012. View Current Job Listings at Boar's Head - Boar's Head Jobs. Advanced Bash-Scripting Guide. Bash Shell Scripting. Currently this book provides an introduction level knowledge of Bash.

Go to #External Programs, #External Links, #Using man, info and help for further directions and inspirations. Introduction[edit] What is Bash? [edit] What is shell scripting? In addition to the interactive mode, where the user types one command at a time, with immediate execution and feedback, Bash (like many other shells) also has the ability to run an entire script of commands, known as a "Bash shell script" (or "Bash script" or "shell script" or just "script"). Shell scripting is the art of creating and maintaining such scripts. Shell scripts can be called from the interactive command-line described above; or, they can be called from other parts of the system. Shell scripts are commonly used for many system administration tasks, such as performing disk backups, evaluating system logs, and so on.

How to read this book[edit] (1) It's ideal to practice BASH while reading (2) Try consulting documentation for unknown commands. Linux Shell Scripting Tutorial - A Beginner's handbook. Formatting SQL*Plus Reports. This chapter explains how to format your query results to produce a finished report. This chapter does not discuss HTML output, but covers the following topics: Read this chapter while sitting at your computer and try out the examples shown. Before beginning, make sure you have access to the HR sample schema described in SQL*Plus Quick Start.

Formatting Columns Through the SQL*Plus COLUMN command, you can change the column headings and reformat the column data in your query results. Changing Column Headings When displaying column headings, you can either use the default heading or you can change it using the COLUMN command. Default Headings SQL*Plus uses column or expression names as default column headings when displaying query results. Changing Default Headings You can define a more useful column heading with the HEADING clause of the COLUMN command, in the following format: COLUMN column_name HEADING column_heading Example 6-1 Changing a Column Heading Note: Formatting NUMBER Columns. Linux and Unix Basics: What is UNIX? Virtual Training Company (VTC) - Software Training. Veteran VTC instructor Bobby Rogers guides security professionals through an in-depth review of the Certified Ethical Hacker (CEH) v8 exam (312-50). This course provides step-by-step demonstrations of the different methods and tools needed to master the exam, as well as the concepts and knowledge a professional ethical hacker needs for the real world.

The course covers all areas tested on the exam, including system hacking, network attacks, web application hacking, and cryptography. Click on the movie links below to begin learning today. To view other FREE VTC tutorials in this course: To view other FREE VTC tutorials by author Bobby Rogers: COURSE OUTLINE:01 Introduction0101 Welcome0102 Exam Info0103 Course Outline0104 Lab Setup 02 Intro to Ethical Hacking0201 About Hacking0202 About Hackers0203 Types of Tests0204 Defenses0205 Methodology0206 Hacking Tools0207 BackTrack 5 Tour 15 Credits1501 About the Author.

Oracle Solaris 11 System Administration - Exam 1Z0-821. Photoshop Tutorials :: SQL (Structured Query Language) in one page : SQL.SU. NTI. Masters (MS) in Computer Science, IT MSCS | Maharishi U. Cheat Sheets. Download All (.zip) Wall Posters (36" x 24") Interior Gateway Protocols v1.0 (1 page) Protocols v2.1 (2 pages) v2.1 (1 page) First Hop Redundancy v2.0 (1 page) v2.2 (2 pages) IPsec IPv4 Multicast IPv6 v2.0 (2 pages) v1.2 (1 page) v1.1 (1 page) Spanning Tree Applications Wireshark Display Filters scapy tcpdump Reference Common Ports IOS IPv4 Access Lists IPv4 Subnetting Syntax Markdown MediaWiki Technologies Frame Mode MPLS IOS Zone-Based Firewall QoS VLANs Voice VOIP Basics Miscellaneous Cisco IOS Versions Physical Terminations. COLUMN. Syntax COL[UMN] [{column | expr} [option ...]] where option represents one of the following clauses: ALI[AS] aliasCLE[AR]ENTMAP {ON | OFF}FOLD_A[FTER]FOLD_B[EFORE]FOR[MAT] formatHEA[DING] textJUS[TIFY] {L[EFT] | C[ENTER] | R[IGHT]}LIKE {expr | alias}NEWL[INE]NEW_V[ALUE] variableNOPRI[NT] | PRI[NT]NUL[L] textOLD_V[ALUE] variableON | OFF WRA[PPED] | WOR[D_WRAPPED] | TRU[NCATED] Specifies display attributes for a given column, such as text for the column headingalignment of the column headingformat for NUMBER datawrapping of column data Also lists the current display attributes for a single column or all columns.

Enter COLUMN followed by column or expr and no other clauses to list the current display attributes for only the specified column or expression. Terms {column | expr} Identifies the data item (typically, the name of a column) in a SQL SELECT command to which the column command refers. ALI[AS] alias Resets the display attributes for the column to default values. FOR[MAT] format HEA[DING] text. 3 مصادر مجانية لتعليم برمجة وتكويد المواقع. 3 مصادر مجانية لتعليم برمجة وتكويد المواقع.

What is littleBits? Datamonkey – Learn to analyse data. CBTNuggets - Maintenance. Virus.DOS.Kuku. Professional Ethical Hacker By Eng-Mahmoud Atef | Arabic. Facebook. 00-Professional Ethical Hacker (Setup Lab) By Eng-Mahmoud Atef | Arabic. What is DHCP and How DHCP Works? (DHCP Fundamentals Explained) Computer networks can be of any form like a LAN, WAN etc. If you are connected to a local LAN or an internet connection, the IP addresses form the basis of communication over computer networks.

An IP address is the identity of a host or a computer device while connected to any network. In most of the cases when you connect your computer to a LAN or internet, you’ll notice that the IP address and other information like subnet mask etc are assigned to your computer automatically. Have you ever thought about how this happens? What is DHCP? DHCP stands for Dynamic Host Configuration Protocol. As the name suggests, DHCP is used to control the network configuration of a host through a remote server.

DHCP works on a client-server model. Understanding DHCP helps in debugging many network related problems. In the next section, we will cover the working of this protocol. How DHCP Works? It is a DHCP message that marks the beginning of a DHCP interaction between client and server. Here are the steps : مجموعة فيديوهات تشرح مجموعة من انواع Firewall بالعربى | ICTTUBE I Free courses for you. Ahmed Ezat - Timeline Photos | Facebook. How To Hack Wifi - WPA & WPA2 Network Easily Through Fern Wifi Cracker In Kali Linux Hacking Wifi Through Brute Force Attack In Kali Linux | Hacking Dream.

Fern wifi cracker is a software used to crack wifi passwords, It is very easy to hack WEP password but very difficult to hack WPA OR WPA2, so now I will explain how to hack WPA & WPA2 passwords easily in Linux based operation system. By guessing the PIN, the router will actually throw back, whether or not the first four digits (of eight) are correct. Then, the final number is a checking number used to satisfy an algorithm. This can be exploited to brute force the WPS PIN, and allow recovery of the WPA password in an incredibly short amount of time, as opposed to the standard attack on WPA.

In thisNull Byte, let's go over how to use both tools to crack WPS. As of yet, no router is safe from this attack, and yet none of the vendors have reacted and released firmware with mitigations in place. Even disabling WPS still allows this attack on most routers. Requirements: 1) Kali Linux – Operation System In Your System Or In Your Flash Disk (USB Pendrive) 2) 4GB or Above Pendrive 3) Kali Live Boot. MicroNugget: CAM Table Overflow Attack. GNU/Linux Distribution Timeline. After a short essay on methodology we’re curious to find out whether there are any master-snoops among our audience. We present exhibit M, a rare specimen we know nothing about but for the fact that it was compiled from bits of Gentoo.

Hence we call publicly for any hints or leads regarding this elusive distribution! Meanwhile, a gentle reader has drawn to our attention the fact that Damn Vulnerable Linux is currently listed as a Slax derivate by the major pundit places, while it certainly boasted a Damn Small Linux pedigree in it’s very beginnings. The switch has happened, but everyone claims not to have seen when it did! Have you? And just in case anyone needs more material, here’s our current ToDo buffer. While checking out the page DW links to Greenie, Newtoos catches the eye. If only project sites had a nicely visible change log / history section… Two distributions for the GLDT 11.7 are done, eight still to go! Mohamed Gamal - [دى من اجمد الماتريال وفيها تجميعة كويسة... جديد حقيبة طالب علم الحاسوب وأمن المعلومات. ‫أسبوع مجاني لتعلم اللغة البولندية | Facebook‬ Using Graphics Cards for More Than Just 3D Graphics.

The heart of all computer systems lies with the CPU or central processing unit. This general purpose processor can handle just about any task. They are restricted to certain basic mathematical calculations. Complicated tasks may require combinations that result in a longer processing time. Thanks to the speed of processors, most people don't notice any real slowdowns. There are a variety of tasks though that can really bog down a computer's central processor. Graphics cards with their GPU or graphics processor unit are one of the few specialized processors that many people have installed in their computers. Accelerating Video The first real application outside of 3D graphics that GPUs were designed to deal with was video. The offshoot of this is the ability to have the graphics card help transcode video from one graphics format to another. SETI@Home Another early application to take advantage of the extra computing power provided by a computers GPU is SETI@Home.

Adobe Creative Suite 4. ‫Gotcha لقيتها - Timeline Photos | Facebook‬ Service Name and Transport Protocol Port Number Registry. Last Updated Expert(s) TCP/UDP: Joe Touch; Eliot Lear, Allison Mankin, Markku Kojo, Kumiko Ono, Martin Stiemerling, Lars Eggert, Alexey Melnikov, Wes Eddy, Alexander Zimmermann, Brian Trammell, and Jana Iyengar SCTP: Allison Mankin and Michael Tuexen DCCP: Eddie Kohler and Yoshifumi Nishida Reference Note Service names and port numbers are used to distinguish between different services that run over transport protocols such as TCP, UDP, DCCP, and SCTP. Available Formats Plain text. Linux Distributions & Installation Methods : Tutorial 2. Introduction to Linux. Here are List of All CCNP Labs | Cisco Network Information Discussion. Now Any Networking Vendor can apply EIGRP freely as below: Last updated: January 2013 Q. Why is Cisco opening up Enhanced Interior Gateway Routing Protocol (EIGRP)?

A. Q. A. Advanced features of EIGRP, such as EIGRP stub, needed for DMVPN and large-scale campus deployment, will not be released to the IETF. Q. A. Q. A. A lot of companies look to USGv6 for IPv6 migration recommendations and best practices, and now with EIGRP open, Cisco will work with NIST to insert EIGRP as a routing protocol in addition to other Interior Gateway Protocols (IGPs). Q. A. Q. A. If your customer is running OSPF simply because you don't want to deploy a proprietary protocol, there may be some EIGRP features that may benefit you.

Q. A. Q. A. Q. DNS spoofing with a simple DNS server using Dnsmasq ~ DdoS hacking articles. The Domain Name System (DNS) is one of the fundamental services of the Internet. By resolving domain names to IP addresses, it makes routing of IP packets possible and thereby lets browsers and other clients connect to remote servers using all kinds of protocols.

By blindly connecting to the IP address returned by the DNS server, however, users put a lot of trust into DNS, because by default, DNS responses are not validated or verified. In this blog post, I’d like to demonstrate how to easily set up a DNS server that allows you to easily forge certain entries manually — thereby allowing you to either block certain domains from your network or to pretend that you are a certain website. This scenario is commonly referred to as DNS forgery or DNS spoofing. Contents 1. DNS is responsible for managing the Internet’s namespace of domains by translating domain names into IP addresses. 2. The scenario described in this tutorial uses the very tiny DNS server Dnsmasq to forge DNS entries. 2.1. Linux Basics: Useful Beginner Information. MicroNugget: DHCP Starvation Attack.

شرح الEigrp - عرب هاردوير. يطلق على الEIGRP مصطلح advanced distance-vector routing protocol اى انه نوع من أنواع ال distance-vector ولأكن بشكل أكثر تطور وقوه في الأداء،يعتبر الEIGRP نسخة معدلة من برتوكول IGRP والذي فارق عالم Cisco فان إصدارات نسخ الios التي تبدءا من 12.3 فما فوق أصبحت لا تدعم ال IGRP،يعتبر الeigrp برتوكول خاص بشركة Cisco اى انه لا يعمل إلا على روترات Cisco وهذا من وجهة نظري عيب كبير في هذا الprotocol،يقوم ال EIGRP بعمل automatically redistribute route information to IGRP neighbors من خلال تحويل الmetric من EIGRP metric 32 bit إلى IGRP metric 24 bit،يعمل بروتوكول الEigrp على Transport Layer 1-مصطلحات عامةConvergence:(التقارب) وتكون الشبكات converged عندما تحتوى ال routing table عند كل روتر في الشبكة تحتوى على مسار إلى كل ال destination وبشكل منظم Metric:هو قيمة (value) تستخدم لقياس الوصول ال destination وتتعدد طرق القياس ومنها Bandwidth, Delay Unicast message: وتعنى إرسال رسالة إلى شخص محدد أو إلى Destination محدد Multicast Message: وتعنى إرسال رسالة إلى مجموعة من الأشخاص من بين أشخاص كثر 7-EIGRP Metric.

You Want to Be a Hacker? The Route to... - Security Training Share. DNS spoofing with a simple DNS server using Dnsmasq ~ DdoS hacking articles. Premium Exam. ROUTE 642-902 Training. Timeline Photos - Security Training Share. NuggetCast: Juniper Basics. The Curious Engineer. MEGA. Vulnerability in World Largest Video Site Turned Million of Visitors into DDoS Zombies - Hacker News. An application layer or 'layer 7' distributed denial of service (DDoS) attacks is one of the most complicated web attack that disguised to look like legitimate traffic but targets specific areas of a website, making it even more difficult to detect and mitigate.

Just Yesterday Cloud-based security service provider 'Incapsula' detected a unique application layer DDoS attack, carried out using traffic hijacking techniques. DDoS attack flooded one of their client with over 20 million GET requests, originating from browsers of over 22,000 Internet users. What makes this case especially interesting is the fact that the attack was enabled by persistent XSS vulnerability in one of the world’s largest and most popular site - one of the domains on Alexa’s “Top 50” list.

XSS vulnerability to Large-Scale DDoS Attack The DDoS attack was enabled by a Persistent XSS (Cross site scripting) vulnerability that allowed the attacker to inject a malicious JavaScript code into the Intercepting the Attack. Anonymity on the Internet « Hacksenkessel's Blog. Using weights to influence BGP routing — Evil Routers. BGP Named Community Lists. Features - Cobalt Strike. Cobalt Strike - Penetration Testing Software. Cobalt Strike - Penetration Testing Software. IOS IP Configuration Guide, Release 12.2 - Configuring BGP [Cisco IOS Software Releases 12.2 Mainline]

BGP Confederations. IOS Switching Services Command Reference, Release 12.2 - Commands: ip cef accounting through lane fssrp [Cisco IOS Software Releases 12.2 Mainline] RIP static route redistribution. Redistributing Routing Protocols. An7i Security: Pwn the n00bs - Acunetix 0day. SP Networks and MPLS Evolution. Ciscawy Broadcast on USTREAM: أول راديو لمهندسى الشبكات فى الوطن العربى , انتظرونا كل يوم جمعة من الساعة 8 مساءا للساعة 10 مساءا, كلامنا كله فى الشبكات وه... ISP_part10(ISP teams) Domains and Forests Technical Reference: Active Directory. Windows 8 eBooks Collection. TCP/IP Protocol Sequence Diagrams. Nobody. Offensive Security 2013 - FSU - Lecture19: Metasploit / Social-Engineer Toolkit. 6 Resources And Tutorials On Kali Linux. Courses. PowerShell commands | PowerShell. Student video on switch port securty - Cisco Networking Academy. 01-Certified Ethical Hacker | CEH v7 | Lecture 1 By Eng-Mahmoud Sakr - Arabic. 01-Red Hat Certified System Administrator (RHCSA) (Lecture 01) By Eng-Mahmoud Sakr.

Security Materials(Torrents) Experience the Next Network Evolution with Cisco Network Programmability Training. Shellcode Basics. ‫شيخ العمود‬ Learn Pentesting Online. Operating system concepts. Information security.


E-Learning. علوم شرعية. Programming. 4th. Computer Science.