VULNERABILITY ASSESSMENTS
THE CHALLENGES OF VULNERABILITY ASSESSMENTS Network vulnerability assessments are widely recognized as a crucial component of network security and a
Read moreTHE CHALLENGES OF VULNERABILITY ASSESSMENTS Network vulnerability assessments are widely recognized as a crucial component of network security and a
Read moreIt is possible that email and browser-based viruses, Trojans and worms are the source of the myth that Windows is
Read moreLINUX/UNIX has three most important parts. They are Kernel, Shell and File System Figure: Layers of Linux Kernel Kernel is
Read moreLinux can give you: 1. A modern, very stable, multi-user, multitasking environment on your inexpensive PC hardware, at no (or
Read moreInstalling GCC on CentOS 7, is really an easy task and it shouldn’t take more than 10 minutes. 1. Update
Read morexrdp installation on CentOS 7 Prerequisites 1. First, install Gnome GUI on CentOS 7 / RHEL 7 2. xrdp is available
Read moreCreate user in linux Use the adduser command to add a new user to your system. Be sure to
Read moreCreate and View file in linux The ‘cat’ command is used to display text files. It can also be used
Read morerm command to delete files in linux The rm command (short for remove) is a Unix / Linux command
Read morels – linux command to listing files and directory Here is video to show how to use ls command in
Read more