![]() ![]() Exploitation uses it to exploit the applications by cracking their administrator or other account passwords, Information Gathering uses it when we have to get the social media or other accounts of the C.E.O. Password cracking is a mechanism that is used in most of the parts of hacking. ![]() SORT command in Linux/Unix with examples.AWK command in Unix/Linux with examples.Sed Command in Linux/Unix with examples.groupadd command in Linux with examples.Linux Virtualization : Linux Containers (lxc).Linux Virtualization : Resource throttling using cgroups.How to Change Root Password in Kali Linux?.How to Change the username or userID in Kali Linux?.ISRO CS Syllabus for Scientist/Engineer Exam.ISRO CS Original Papers and Official Keys.GATE CS Original Papers and Official Keys. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |