So I gave myself a challenge. Can I share my linux-box screen to a total technophobe who is unwilling to do anything that involves submitting an email, creating an account, or installing any software.
Yes, yes I can.
PENETRATION TESTING WITH BACKTRACK Penetration testing is a legal and authorized attempt to exploit a computer system with the intent of making a network or system more secure. The process include scanning system is vulnerable to attack from a real hacker. Penetration testing has … Read More
ODroid-X comes from Hardkernel, a Korean based company. Hardkernel is already known for releasing the ODroid-A and ODroid-Q, tablets that come with a Samsung 4210 Dual Core & 4412 Quad Core CPU respectively, and feature clear-see through backing with instillation of Andoid OS. Most of … Read More
In this tutorial we’ll be learning how to create a swap file in CentOS. When we install Linux, part of the process when creating a partition is creating a swap partition. A Swap is more less like Windows file. When your RAM is full Linux … Read More
* – Tutorial; Checking Linux Distribution Version – * Checking Linux distribution version is very easy. All we need to do is read what is in a specific file, in the /etc/ directory. It varies from distribution to distribution, however, in most cases, they will … Read More
* – Disable root Login via SSH – * One of the basic thing to secure a server is to disable root login via Secure Shell (SSH). By disabling root login at least people can not login remotely as root. Even is they guess the … Read More
Got a virus that just wants to stay? Virus removal happens to be the one topic most computer newbies are most afraid of. The fact that different viruses are floating around in the news world only functions to heighten the anxiety of the threat … Read More
Oldies But Goodies Never Die If you’re looking to find out how to play your old DOS games in Windows, you’ve come to the right place. If you grew up in the 90’s, like me, I’m sure you had your pick of Dos games you … Read More