How to Become an Ethical Hacker. Security on internet is very important. And to improve the security, there’s been an increasing demand for ethical hackers (also known as white hat hackers) as they protect the computer systems from dangerous intrusions. There’s been need of technically skilled IT pros with a strong desire to solve problems and prevent malicious hackers from causing damage to network systems.
Because the internet security is not about creating awareness, it’s all about contributing to improve it. And Ethical hacking is the way we can contribute. So i am writing this article to share how to become an ethical hacker, But all you need is to keep ‘patience’. Before starting the article, clear your concepts regarding difference between a hacker and a cracker A hacker is a computer programmer who loves to tweak with the computer systems to get more than available information and would like to have an unrestricted access to anything he desires.
How to become an Ethical Hacker You Must have knowledge of: 1. 2. 4. Shell Scripting - Checking Conditions with if. In Bourne Shell if statement checks whether a condition is true or not. If so , the shell executes the block of code associated with the if statement. If the statement is not true , the shell jumps beyond the end of the if statement block & Continues on. Syntax of if Statement : if [ condition_command ] then command1 command2 …….. last_command fi Example: #! If-else Statement : In addition to the normal if statement , we can extend the if statement with an else block. Syntax : if [ condition_command ] then command1 command2 …….. last_command else command1 command2 …….. last_command fi #! If..elif..else..fi Statement (Short for else if) The Bourne shell syntax for the if statement allows an else block that gets executed if the test is not true. If [ condition_command ] then command1 command2 …….. last_command elif [ condition_command2 ] then command1 command2 …….. last_command else command1 command2 …….. last_command fi Example : #!
Nested if statements : Basic syntax of nested if is shown below : #! SUSE Linux Enterprise 12: new features and extensions. Congratulations are in order for the fine folks at SUSE LLC. Today in Nuremburg, Germany SUSE announces the availability of SUSE Linux Enterprise 12 (SLES 12). SLES 12 is a much-anticipated release due to several improvements. I had the pleasure of speaking with SUSE's George Shi, Product Marketing Manager and Kerry Kim, Director of Strategic Marketing about the release and some of the new features. We began by talking about the general available release of SLES 12 and the announcement, including the new features and extensions. One in particular struck my fancy: Geo-clustering. Immediately upon hearing the term, you know what it means.
It means clustering over distances via WANs or the Internet. When people think of disasters and DR, they typically think earthquake, meteor, terrorist attack, major weather event or something large scale. Please note that SLES geo-clustering is a separate subscription service (cost), but I think it's well worth it. Related Stories: How To Install The MATE Desktop On Your Linux System. Compared to just a few years ago, the desktop environment landscape for Linux has changed significantly. If you don’t like change, or you have other reasons for liking the old Gnome 2 desktop, the MATE desktop might be the right choice for you.
But comparatively speaking it’s not a very popular choice just yet, so it might not be very obvious as to how to get it. A Review Of MATE - Is It A True Gnome 2 Replica? [Linux] A Review Of MATE - Is It A True Gnome 2 Replica? [Linux] The world of Linux desktop environments has dramatically changed since then. If you’re interested in using the MATE desktop, here are several ways to get it, including on your favorite distributions. Distributions with MATE If you’re looking to do a fresh installation of a Linux system, it’s easy to pick an option that comes with the MATE desktop ready to go. Lastly, the Fedora MATE spin is great for people who have used Fedora before, because all of Fedora’s desktop environment spins are very “pure”. Elementary OS: Don't Hate Me Because I'm Beautiful. The upcoming Freya release is going to be even more popular than its predecessors and no one really knows why elementary OS is a Linux distribution based on Ubuntu, and using solely this description users should not be impressed.
Something else is happening with this operating system, something that is not fully understood. Ubuntu is a very popular base and it's used by too many systems to count. Ubuntu itself is based on Debian, but for now we’ll stick with Ubuntu. elementary was not supposed to be an operating system, and in fact it started its life just as a collection of themes and a few other packages that allowed users to make Ubuntu look different. The developers soon realized that they could do better than this and made their own operating system. Don't hate me because I'm beautiful One of the reasons why elementary OS has become one of the most sought after Linux distributions is its beauty.
Linux users secretly want a distro that treats them like Apple treats Mac OS X users. Linux Training. Linux Training. Linux Training. Linux Training. Fedora Present and Future: a Fedora.next 2014 Update (Part II, “What’s Happening?”) | Fedora Magazine. This is part two of a series based on talks in February at DevConf in the Czech Republic. You should start with Part I, “Why?” , unless you are inclined to just believe everything I say with no justification. That part covered the background and outlined some problems we are trying to solve; this part talks about what we are actually doing, and why we think those things address the problems.
Next week I’ll cover the governance structure and current status, followed by panel discussion, and Q&A after that. As before, you can watch the video on YouTube, but there are a few reasons you might want to read this instead. The Video, Continued (For this article, we start at 13 minutes, 47 seconds in.) Time for Some Answers! So, having talked about some of the questions we face, here we go with some of the answers. Here, though, I cover a few of these initiatives briefly, and connect each into why we are doing it. Multi-level “Rings” Approach Never before seen in public! Why Rings? Products Proposal. Linuxfoundation : An Introduction to the AWS... An Introduction to the AWS Command Line Tool Part 2.
In Part 1 of this series, I introduced awscli, a powerful command line interface which can be used to manage AWS services. I’d like to continue digging deeper into awscli by provisioning a Volume with Amazon Elastic Block Store (EBS) and creating an Amazon Relational Database Service (RDS) MySQL instance. By using awscli to provision EBS volumes, we have a simple and cost effective way via the command line, to expand our Ec2 disk capacity without any downtime. EBS volumes also support snapshots, providing us with low level block device backups which can be restored or copied to new or existing Ec2 instances. RDS instances are a way System Administrators can run our own Databases within AWS without having to spend the extra effort on complex performance tuning, routine maintenance and redundancy configuration. Both Amazon EBS and RDS are available to new AWS customers under the AWS Free Usage Tier.
Create and Attach a Volume with Elastic Block Store $ aws rds describe-db-instances. Binarytides - Collection of Linux Command Cheatsheets. The Virtualization Cookbook for IBM z/VM 6.3, RHEL 6.4, and SLES 11 SP3. 25+ examples of Linux find command – search files from command line. Linux find command The Linux find command is a very useful and handy command to search for files from the command line.
It can be used to find files based on various search criterias like permissions, user ownership, modification date/time, size etc. In this post we shall learn to use the find command along with various options that it supports. The find command is available on most linux distros by default so you do not have to install any package. The find command is an essential one to learn, if you want to get super productive with the command line on linux.
The basic syntax of the find command looks like this $ find location comparison-criteria search-term Basic examples 1. This command lists out all the files in the current directory as well as the subdirectories in the current directory. $ find . . The command is same as the following $ find . $ find . 2. The following command will look for files in the test directory in the current directory. . $ find . $ find . We can also use wildcards 3. Software Compilation 4.11. KDE Software Compilation 4.11 August 14, 2013. The KDE Community is proud to announce the latest major updates to the Plasma Workspaces, Applications and Development Platform delivering new features and fixes while readying the platform for further evolution. The Plasma Workspaces 4.11 will receive long term support as the team focuses on the technical transition to Frameworks 5.
This then presents the last combined release of the Workspaces, Applications and Platform under the same version number. Also available in: English | Català | Catalan (Valencian) | Deutsch | Español | Suomi | Français | Italiano | Nederlands | Polski | Português | Português brasileiro | Русский | Svenska | Українська This release is dedicated to the memory of Atul 'toolz' Chitnis, a great Free and Open Source Software champion from India. These releases are all translated in 54 languages; we expect more languages to be added in subsequent monthly minor bugfix releases by KDE.
Release Parties Support KDE KDE e.V.' How to Build a Firewall With Linux | Linux Foundation Training. In this Linux training video, Dr. Chris Brown discusses the basics of packet filtering and how you can use them to build a firewall. The material that is presented in this tutorial is covered in great detail in our Linux Network Management (LF342) course. About Dr. Chris Brown Dr. Chris Brown has taught UNIX and Linux extensively for more than 25 years, mostly in Europe and the USA, but also in Canada, India, Hong Kong, Brazil and Saudi Arabia. About Linux Foundation Linux Training The Linux Foundation offers comprehensive Linux training for developers and system administrators who want to learn from the best.
Why did Linux succeed on servers? Mon 20 May 2013 07:45:13 PM PDT Unlike the RISC Unix boxes from back in the day, a typical PC-architecture server is a Purchasing Manager's grab bag of cheap parts available on attractive terms. As an OS developer, you don't know what weird mix of hardware you're going to have to support, even if you're part of the OS team at the hardware vendor. ("Hey, it turns out that the new server is going to have RatBag 2000 Ethernet cards after all. That's not a problem, it it? ") So in order to make an OS that will run on all the bastard spawn x86 servers out there, you need to have either (1) the market power to make the hardware vendors code and test the drivers for you to support a stable driver ABI, as Microsoft did for Windows NT, or (2) the hacker chutzpah to break incompatible drivers frequently, so that in order to work at all, a driver has to "live in the tree" and be maintained as part of the OS.
So the secret to Linux's success on servers is here: Stable API Nonsense. Distributions Shipping KDE. 100 Linux Tutorials Campaign | The Linux Foundation Video Site. 9 Linux podcasts you should follow. There are a number of great websites that report on Linux-related news. But sometimes it's nice to listen to your news while driving to work...or playing in the background while getting some actual work done. For that, you need podcasts. But with so many out there, where do you start? With that question in mind, I present to you some of the best podcasts (both audio and video) that the Linux world has to offer. This Week In Linux – A great series of short videos covering, predominantly Linux and Android specific topics, produced by Jordan Keyes.
FLOSS Weekly – Part of the TWiT network, FLOSS Weekly (“Free Libre Open Source Software”) is hosted by Randal Schwartz – who is an all-around good dude – and a generally rotating crew of co-hosts. Linux Action Show – Full disclosure here. The Linux Link Tech Show – This is the granddaddy of Linux podcasts, running continuously since 2003 (almost 10 years now). Linux Outlaws – How to describe this show... World of Linux – This is my show. Ubuntu Offers One Operating System for Any Device - Phone, Tablet, or PC. Making a single operating system work on smartphones, tablets, laptops, and TVs is a tricky proposition.
You can’t just scale a mobile OS up or a desktop OS down; you have to build software that is flexible enough to adjust for different use cases. And if you want developers’ apps work across multiple devices running your OS, you have to figure out how to make that work, too. This is what Canonical, the U.K. company that developed Linux-based operating system Ubuntu, is trying to do. On Tuesday, the company revealed its tablet interface for Ubuntu, which it called the “next step” in allowing a “unified family of experiences” on smartphones, tablets, PCs, and TVs. This follows Canonical’s January announcement of a smartphone version of its software (see “Ubuntu to Offer Smartphone Operating Software”) that it demonstrated at MIT in early February (see “Ubuntu Invites Phone Makers to Cheat on Google”).
Detailed Error Handling In Bash. By Willem Bogaerts, application smith at Kratz Business Solutions Summary Shell scripts are often running as background processes, doing useful things without running in a visible shell. Think, for example, of cron jobs or scripts that are fired from a program on a web server. To write such scripts can be quite painful, as all errors occur out of sight as well. My solution is to log only the errors with all the details to a small database. The database SQLite needs some settings to work as I expect it to, and these settings can be put in an initializing script. .bail ON .echo OFF PRAGMA foreign_keys = TRUE; Off course, we also need a database and I do not want to rely on one to exist. The mechanism Now we have the database defined, we can focus on the error handler itself. False || echo "non-zero exit" false false;true If we define a function that will log all error data, we can pass that function to the trap command.
Caveat Invoking the error handler Optional. A list of variables to log. . #!
Fedora Related. Free Linux Permission Chart Conversion Tool. Puppet Labs: IT Automation Software for System Administrators. Unknown Bash Tips and Tricks For Linux. Familiarity breeds ennui, and even though Bash is the default Linux command shell used daily by hordes of contented users, it contains a wealth of interesting and useful features that don't get much attention. Today we shall learn about Bash builtins and killing potential. Bash Builtins Bash has a bunch of built-in commands, and some of them are stripped-down versions of their external GNU coreutils cousins. So why use them? Bash aliases Bash keywords Bash functions Bash builtins Scripts and executable programs that are in your PATH So when you run echo, kill, printf, pwd, or test most likely you're using the Bash builtins rather than the GNU coreutils commands.
. $ command -V echo echo is a shell builtin $ command -V ping ping is /bin/ping The Bash builtins do not have man pages, but they do have a backwards help builtin command that displays syntax and options: $ help echo echo: echo [-neE] [arg ...] The type command looks a lot like the command builtin, but it does more: Bash Functions. DeveloperWorks : New to Linux programming and Linux system administration.
Linux. Educational Videos. Samba. Linux OS. The Linux System Administrator's Guide.