Nessus has a free version for personal use where you can scan your local network remotely for vulnerabilities that malicious hackers could use to gain access for you servers or computers at home. It is fairly easy to start a scan and even more easy
Quote from Arnold Schwarzenegger “Strength does not come from winning. Your struggles develop your strengths. When you go through hardships and decide not to surrender, that is strength. And i have been fighting Windows with Linux for years! But I have to admit i am
Info CUPS (Common Unix Printing System) is a tool there is allowing you Raspberry Pi to act as a network printer, and the tool will of course work on other systems aswell. You can manage Classes, ques, filter and so much more with CUPS and
This is mainly a note to myself because I keep forgetting these two very simple steps, it is only two commands and then you are good to go. Well as the headline says we are going to create an SSH connection without having to enter
I bought a python course from udemy because they have some great prices right now, lucky me. But the instructor recommends his students to use jupyter notebook doing his course and i must admit that i am impressed! jupyter notebook has it all! you can
Graylog2 is a centralized log management system. It is based on Elasticsearch and MongoDB, and are able to analyze and aggregate log messages from multiple sources. I don’t think it would be wrong to say that Graylog2 is one of the big players when it
There can be various reasons to change the python version you are currently using. I had to change mine so i could write in Python 2.7.xx and run it with the terminal. It is a fairly simple process. First navigate and use _ls -l _
LaTeX is a document preparation system with high-quality typesetting. It is used to produce everything from scientific papers to math assignments, the possibilities are endless here. I have used LaTeX to write math and historical assignments and I must admit I have been very impressed
Step 1. Create test file Lets make a test file first.
echo "Up hill and over dale">>myfile.txt
Up hill and over dale
Step 2. Encrypt now that we have created our test file the lets encrypt it with a password You should create a strong password!
gpg -c --encrypt file.txt
you will be prompted to enter a
In my latest guide I showed you guys how install and configure a PXE Boot server and how to boot up a CentOS 7 installation. I have been playing around with the PXE Boot server and tried to get it to boot a Ubuntu 14.04