In this article, I will tell you how we can manage network connections in Linux. So in this article, we will learn to use nmcli tool. It is a NetworkManager Tool. It can be used to display network device status, create, edit, activate/deactivate, and delete network connections. So it is a very important tool that helps us to save time. Because we can manage the network connections/profiles directly with the nmcli tool without accessing the GUI NetworkManager. The commands are very short and so simple. So if a beginner tries to managing the NetworkManager Connections/profiles then it wouldn’t be difficult to manage any network with nmcli tool.
In this article, I will explain how a local repository is set up on RHEL 8. If you want to install a package in RHEL 8, it will throw an error telling you the dependencies and the repo files error. So to resolve this error, we should install YUM / DNF repository locally or use RHEL’s subscription management. Friends, likewise, in other distros of RHEL we had to set repo files manually, as expected here we would have to do the same. So here I will tell you the set up of local YUM / DNF repo using DVD. So let’s start without wasting time – Continue reading “How To Set Local YUM/DNF Repository On RHEL 8?”
In this article, I will discuss all about the ACLs (Access Control Lists) that What are ACLs, How many types of there are? Why does use ACLs? and more. So friends basically ACLs stand for Access Control Lists. ACLs are the Layer 3 security of the OSI model. So It can be used on layer3 devices like routers and firewalls. And ACL is also called Packet Filtering Firewall. ACLs add an extra layer of security to our network. Now its time learn something more about ACLs –
In this article, I will explain to you How to configure the Vlans on a network. Friends this is a very important topic of the CCNA course. So for those students who are looking for CCNA certification and also who want to grow their career in the networking field, Vlan is very important. Now here the question comes that why do we need VLANs. And in beginners mind, there must be a question that what is VLAN. So let’s discuss all these topic –
In this article, I will explain how we can stop access telnet by any host in a network. So stop telnet from accessing by a host of the network, I will use ACL. Why we would do that? I think you must think we want to block telnet for particular hosts or for a network. So friends block or deny hosts to access TELNET for security purposes. Yes, friends, we do this because we don’t want to give access to any unauthorized person to enter our system. So for safety reasons we filter the network traffic and allow some particular hosts to access telnet.
Rsync is a command-line tool in Linux that stands for remote synchronization. It is used to copy files from a source location to a destination location. You can copy files, directories, and the entire file system and keep in sync the files between different directories. It does more than just copying the files. It reduces the amount of data sent over the network by only sending the files which are new or updated. That’s why is it considered a great utility for file copying and backing up. Rsync also supports the copying of files to a remote system over SSH.
In this article, I will explain to you, how you can attack a webserver through Termux. Friends, as you know DDoS attack is the easiest way to take down any website. So this attack is mostly used by the attackers for revenge. From this attack, the attacker gets nothing but aims to complete revenge. This type of attack can be done for money as well. To perform such an attack, the attacker gets huge money in return.
In this article, I will teach you ‘ How can we create a Payload Using Termux’. Friends making a payload is not as hard as we think. It’s a simple process. But we need to install some prerequisites before making a payload. If we will not complete these steps then we cant create payload in Termux. So let’s discuss what are these requirements for making a payload –
In this post I will discuss about Trojans that What are Trojans, How do trojan work, And How does trojan affect or devices. So let’s start –
In this post, I will describe the open-source vulnerability scanning and network scanning tool that is NMAP. The full-form of NMAP is network-Mapper. NMAP is a very popular tool. Because this tool is free and open-source and used world-widely to find any vulnerability in any system or to scan a network. We can gather much important information from this tool like operating system detection, host scanning, open ports, any security risk, and much more.
In this article, I will explain to you the installation of the osTicketing System. So Friends as you know osTicket is an Open Source Helpdesk Support System which is used worldwide. We can manage and organize customer inquiries and complaints in one place. It provides us a user-friendly environment so it becomes very easy to manage the osTicket system.
Is Indian Government Planning to Ban On Cryptocurrency? Yes, Indian govt. has planned to ban the cryptocurrency. They have introduced a new law that will not allow any user to invest in crypto trading. Indian govt. took this decision to keep stay with like other Asian countries in the fledgling market. According to some inspection, this bill will be discussed very shortly by the federal member before sending it to the parliament.
Don’t Know What is Cryptocurrency?
Read this –
A cryptocurrency (or cryptocurrency) is a digital asset designed to work as a medium of exchange wherein individual coin ownership records are stored in a ledger existing in a form of computerized database using strong cryptography to secure transaction records, to control the creation of additional coins, and to verify the transfer of coin ownership. It typically does not exist in physical form (like paper money) and is typically not issued by a central authority. ……( Wikipedia)
In 2018, the Indian govt. suddenly banned te cryptocurrencies when there was a string of frauds in the months. During then the following Prime Minister decided to ban the crypto transactions. But since then Cryptocurrency regulates association fought a case against the Indian govt. In 2020 they got success and in may 2020 this ban was terminated but now in October the govt. again trying to ban the Crypto Trading.
If the Indian govt. bans the Crypto trading then it will affect more than 1.7 billion Indian Tradings in digital assets and a rising number of companies setting up a platform for the trade, according to data research.
Instead of a ban, India needs a regulatory framework to protect uninformed retail consumers “to ensure adequate oversight of the government and the RBI over cryptocurrency businesses,” said Sanjay Khan, Partner, Khaitan & Co, a New Delhi-based lawyer who advises firms. “India can actually benefit from such a regulation to attract cryptocurrency investors and businesses.”
In this article, I’ll discuss the apps which can convert your android device into a hacking Device. There are many apps and websites which can allow you to attack and access the data of your victim. But some of these are frauds or some of these charge amounts for their service. But the which I will tell here is free of cost and best of all apps and sites. Continue reading “Top 10 Android Apps To Convert Your Phone Into a Hacking Device.”
In this article, I will share my personal experiences and skills on how anyone can become an ethical hacker. There are many videos and websites that talk about the advanced thing of ethical hacking. But no one talks about absolute beginners. Beginners have no idea about how they can enter the cyberspace field, so here I will talk about absolute beginners, who do not know the right way to enter cybersecurity and hacking.
In this article, I’ll discuss What is Apache Web Server? How Does the apache web server(HTTP server) work?” So here you will learn the basics web server in a very simple way. When we configure the Apache server we must have some basic knowledge about this server. So let’s discuss the basic features of the Apache server Continue reading “What is Apache Web Server? How Does apache web server(HTTP server) work?”
What is Termux?
Termux is an Android Emulator and Linux Environment App. It is a minimal base system is installed automatically. It works with no rooting and additional setup. We can add additional packages to the Termux by APT packages. Termux doesn’t have a fancy interface like other apps have. It has a simple interface with text mode support i.e. minimal base support.
Termux is an Alternate of the Kali Linux OS that is used by hackers. So you don’t know about Kali Linux, Then you are too far from being a hacker. Termux is also said as the Kali Linux of poor people. We know everybody can’t purchase a heavy system( Computer or a laptop). For those Termux, a Linux-based Android platform where they can learn penetration and hacking.
How To Use Termux?
Termux is a command-line android application. So to operate Termux you must be comfortable with the command line and to install the packages in Termux. Termux doesn’t give us an attractive lookup and we don’t have any button or menu bar to operate Termux. There are lots of commands which are used to operate Termux. But here in this article, I will talk about some of the important commands that are specially for Beginner. After learning these commands a beginner/fresher can easily run Termux.
How To Download Termux?
Termux is an open-source android application. So it is free to use. Anyone can download and use Termux without payment. We can directly download it from the Play store. You can also download the form link given below.
Download= TERMUX click here
Most Commonly Used Termux Commands
- && – It’s, not a technical command but it can be used to run multiple commands at a time. Just put this command in the mid of all other commands. For eg. [command] && [command2]. Both commands will run at the same time, first command1 will show its output then command2 will be executed.
- cd – It is used to change the current directory.
- clear – It clears the terminal screen.
- ls – displays or list the all items of the current directory.
- man — displays the guide or manual of the command. For eg. $man ls [ displays the guide about what is ls command and how to use this command ]
- pwd – displays the absolute path of the current working directory.
- cd .. -It changes the current directory to the parent directory
File Management commands
- cat — It is used to display the content of a single file. For eg.
- cp — makes a copy of the file. For eg.
$cp linuxkings.txt [path of the file where you want to copy it]
- mv — moves the original file from one directory to another directory. For eg.
$mv linuxkings.txt [path of the file where you want to move]
- find — finds the exact match in the entire system or directory or file from the given query.
- locate — It displays all possible output of a particular query in the entire system or directories. For eg.
- rm — used to delete files/directory with certain parameters. It is used to delete a single file as well as multiple files.
$rm -rf linuxkings.com
- mkdir — used to create a directory. For eg.
- nano/vim — Nano and Vim are the editors, used to edit the file. Nano is suitable for beginners because vim is a very complex editor to use. For eg.
- touch — used to create empty files with certain parameters. For eg.
User Management Commands
- whoami – displays the currently logged user.
- who — also displays the currently logged user.
- who -a — displays info about all users currently logged in.
- ps — displays info about currently running processes.
- kill/kill all -kill a single process and all processes running in the entire system.
- useradd – adds a new user.
- userdel – deletes user already created.
- groupadd – adds a new group.
- groupdel — deletes the group already created.
- chown — changes the owner of the file/directory.
- chmod – change the permission of the file like read, write, and execute for the users.
System Management Commands
- df — displays the available space and used space on the system.
- du — displays the block size of a file or directory
- free — displays the RAM space, used, and free space of RAM in the system.
- ipconfig – displays the IP address of the system.
- history — shows the commands history that has been used.
- pkg — install packages directly from the APT repository.
- uname — displays the core system information.
- uptime — displays time elapsed since last boot.
- cat /proc/meminfo — show memory-related info.
- cat /proc/cpuinfo –show CPU information
Where is the Home Directory of Termux?
All data of Termux home directory stored in /data/data/com.termux/files.
How To Install Package in Termux?
In Termux it is recommended to use package manager pkg which is a wrapper for apt. It simplifies installing or upgrading packages by automatically updating apt lists so you don’t have to type apt update when installing or upgrading packages
Steps To Install packages-
- Install Packages
pkg install [ package name]
- Uninstall package
pkg uninstall [package name]
- Upgrade Termux Packages
- Update Termux Packages
- List all packages of Termux
- After Installing Termux, Install Official Repositories of Termux
pkg install root-repo
pkg install unstable-repo
pkg install x11-repo
Friends this is all about Termux that a beginner must know. Here I described, What is Termux? How to use Termux, and the Basic commands to run Termux, and many more about Termux.
So, friends, still if you have any doubts or any queries on this post, do not hesitate to contact me. If you like our post, then share it with your friends. And if you have any suggestions for me, please write to me in the comment box.
Do you want to send fake SMS to someone? In this article, I will explain how to send fake SMS to someone. Friends, we will send unlimited fake SMS with our phone. But here we do not need any mobile application to send SMS. The most important thing about this program is that we can send SMS as well as we can make fake calls to our victim anonymously. That’s the great thing about this tool. So, friends, we will use a scripted program to send fake SMS, this script allows you to send unlimited fake SMS / calls to your victim. So, friends, you can use this tool to prank with your friends. Now let’s start without wasting time-
In this article, I will tell you how to hack Instagram from the phone. Friends here I will not use any other device like a computer, laptop, or tablet. Here I will show you ‘How to hack Instagram, simply with an Android phone. Friends let’s start – Continue reading “How To Hack Instagram Account Without Rooted Device? Instagram Termux Hacking using Android Phone.”