The ping command is one of the most used tools for troubleshooting, testing, and diagnosing network connectivity issues. Ping works by sending one or more ICMP (Internet Control Message Protocol) Echo Request packages to a specified destination IP on the network and waits for a reply. When the destination receives the package, […]
This Article Sponsored By Hostingaro Hosting BIND also know as the “Berkeley Internet Name Domain” is one of the most popular Domain Name System (DNS) now a day. It an open-source and provides DNS services on Linux operating systems. Generally, it helps you to resolve a fully qualified domain name […]
Hello Guys Welcome Back another Tutorial my is manikantasripadi today introduced new framework Called Fsociety is a penetration testing system comprises of all penetration testing devices that a programmer needs. It incorporates every one of the devices associated with the Mr. Robot Series. The tool comprises an immense device list beginning […]
What is TeslaCrypt? When detected in February 2015, the new ransomware Trojan gained immediate notoriety as a menace to computer gamers. Amongst other types of target files, it tries to infect typical gaming files: game saves, user profiles, recoded replays, etc. That said, TeslaCrypt does not encrypt files that are […]
As a Linux system admin we generally face low disk space issues. By implementing the user and group disk quota on the file system we can resolve the space issue. Quota restricts the users to use only allowed disk and inodes on the particular file system. In this post we […]
Like any other operating system, GNU/Linux has implemented a memory management efficiently and even more than that. But if any process is eating away your memory and you want to clear it, Linux provides a way to flush or clear ram cache. How to Clear Cache in Linux? Every Linux […]
On Red Hat Linux /CentOS 7 or 8, install dig and nslookup using the dnf command. or yum command # yum install bind-utils Upon successful installation, verify the version using the command below. # dig -v
We can compare a filesystem to a refrigerator, or any other storage with multiple shelves that is used for storing different items. These shelves or compartments help us to organize grocery items in our refrigerator by certain characteristics, such as shape, size, type, and so on. The same analogy is applicable to a filesystem, […]