What Is FTP (File Transfer Protocol)?

The File Transfer Protocol or FTP is a network protocol used to transfer files between hosts or computers. FTP protocol is created as a client-server model where the server serves the files and different single or multiple clients can connect to the server and download or upload files. FTP first…

0 Comments

How To Git Reset Hard?

git reset or git-reset commands are used to reset changes to the previous version in Git software. Git reset is popularly used because of its function where we can go back to whatever version we want. Reverting changes to the back can be done in different ways. “Git reset hard”…

0 Comments

What Is GCC (GNU Compiler Collection)?

The GNU Compiler Collection or GCC is a compiler and related auxiliary tools which are used to compile different programming languages into binary and related formats. GCC has been created and currently developed by the GNU Project. Also, the GCC name comes from the GNU as you have noticed. GCC…

0 Comments

What Is Wildcard Character(s)?

The wildcard character generally acts like an asterisk character. The wildcard is generally used in programming, scripting, IT in order to express special meanings for different cases. Wild Character or Wildcard Character or Wildcard Well, the character is actually not important but the function is more important for the wildcard.…

0 Comments

What Is File Explorer (Windows)?

Files and folders are an important part of the operating system and daily computer usage. File Explorer is a generic term used to describe an application or tool which is used to manage files and folders in an operating system. But generally, the term File Explorer is used for the…

0 Comments

Ettercap Tutorial For Network Sniffing and Man In The Middle

As pentester we use a lot of tools during penetration tests. One of the main parts of the penetration test is man in the middle and network sniffing attacks. We generally use popular tool named ettercap to accomplish these attacks. In this tutorial we will look installation and different attack…

0 Comments

Linux Avahi Daemon Tutorial With Examples

Avahi is an mDNS/DNS daemon, service which implements Apples’s Zeroconf mechanism. Zeroconf is also known as Rendezvous or Bonjour. Zeroconf have their main task to process. Automatic assignment of numeric network addresses Automatic distribution and resolution of hostnames, Automatic location of network services such as printing devices. Installing Avahi Avahi-daemon…

0 Comments

Linux Log Files /var/log Tutorial with Examples

Linux provides a lot of different types of logs by default. These files are generally located at /var/log . There may be some exceptions like third party applications but the configuration of log location can be changed to the /var/log directory. In this post, we will look at default log files and…

0 Comments

How To Install Gns3 To Fedora?

Gns3 very useful tool to simulate real networks and systems. In the first days of its Gns3 was simple Cisco IOS image emulator. But recent years its development has gained momentum. This made Gns3 a multi-platform, flexible real-world simulator. Gns3 supports systems like Cisco, Juniper, Palo Alto, Pfsense, Docker, etc.…

0 Comments

Linux SCP Command Usage With Examples

Scp is an acronym for Secure Copy. It is used primarily for copying files over an ssh connection. The copied files are encrypted and assumed secure as ssh. If the files contain sensitive data copying them with SCP or similar encrypted protocol is the best solution. In this tutorial, we…

0 Comments