How To Manage Network Connection Using ‘nmcli’ Tool?

In this article, I will tell you how we can manage network connections in Linux. So in this article, we will learn to use nmcli tool. It is a NetworkManager Tool.  It can be used to display network device status, create, edit, activate/deactivate, and delete network connections. So it is a very important tool that helps us to save time. Because we can manage the network connections/profiles directly with the nmcli tool without accessing the GUI NetworkManager. The commands are very short and so simple. So if a beginner tries to managing the NetworkManager Connections/profiles then it wouldn’t be difficult to manage any network with nmcli tool. 

Continue reading “How To Manage Network Connection Using ‘nmcli’ Tool?”

How To Set Local YUM/DNF Repository On RHEL 8?

In this article, I will explain how a local repository is set up on RHEL 8. If you want to install a package in RHEL 8, it will throw an error telling you the dependencies and the repo files error. So to resolve this error, we should install YUM / DNF repository locally or use RHEL’s subscription management. Friends, likewise, in other distros of RHEL we had to set repo files manually, as expected here we would have to do the same. So here I will tell you the set up of local YUM / DNF repo using DVD. So let’s start without wasting time – Continue reading “How To Set Local YUM/DNF Repository On RHEL 8?”

Different Types Of Protocols And Port Numbers

In this article, I will discuss various protocols and port numbers and the usage of protocols. Some of the most common protocols are summarized below Continue reading “Different Types Of Protocols And Port Numbers”

What are ACLs? Types of ACLs? Why do we use ACLs? What are the differences between Standard and Extended ACLs?

In this article, I will discuss all about the ACLs (Access Control Lists) that What are ACLs, How many types of there are? Why does use ACLs? and more. So friends basically ACLs stand for Access Control Lists. ACLs are the Layer 3 security of the OSI model. So It can be used on layer3 devices like routers and firewalls. And ACL is also called Packet Filtering Firewall. ACLs add an extra layer of security to our network. Now its time learn something more about ACLs –

Continue reading “What are ACLs? Types of ACLs? Why do we use ACLs? What are the differences between Standard and Extended ACLs?”

How To Configure VLANs – CCNA Practical LAB

In this article, I will explain to you How to configure the Vlans on a network. Friends this is a very important topic of the CCNA course. So for those students who are looking for CCNA certification and also who want to grow their career in the networking field, Vlan is very important. Now here the question comes that why do we need VLANs. And in beginners mind, there must be a question that what is VLAN. So let’s discuss all these topic –

Continue reading “How To Configure VLANs – CCNA Practical LAB”

ACL To Deny Telnet/SSH From A Network On Cisco Router – CCNA Lab

In this article, I will explain how we can stop access telnet by any host in a network. So stop telnet from accessing by a host of the network, I will use ACL. Why we would do that? I think you must think we want to block telnet for particular hosts or for a network. So friends block or deny hosts to access TELNET for security purposes. Yes, friends, we do this because we don’t want to give access to any unauthorized person to enter our system. So for safety reasons we filter the network traffic and allow some particular hosts to access telnet.

Continue reading “ACL To Deny Telnet/SSH From A Network On Cisco Router – CCNA Lab”

RSYNC Command in Linux with Examples

Rsync is a command-line tool in Linux that stands for remote synchronization. It is used to copy files from a source location to a destination location. You can copy files, directories, and the entire file system and keep in sync the files between different directories. It does more than just copying the files. It reduces the amount of data sent over the network by only sending the files which are new or updated. That’s why is it considered a great utility for file copying and backing up. Rsync also supports the copying of files to a remote system over SSH.

Continue reading “RSYNC Command in Linux with Examples”

How To Use Termux To Perform DDoS Attack in 2020? Most Powerful Tool For DDoS Attack – Linux Kings

In this article, I will explain to you, how you can attack a webserver through Termux. Friends, as you know DDoS attack is the easiest way to take down any website. So this attack is mostly used by the attackers for revenge. From this attack, the attacker gets nothing but aims to complete revenge.  This type of attack can be done for money as well. To perform such an attack, the attacker gets huge money in return.

Continue reading “How To Use Termux To Perform DDoS Attack in 2020? Most Powerful Tool For DDoS Attack – Linux Kings”

How To Create Payload Using Termux?

In this article, I will teach you ‘ How can we create a Payload Using Termux’. Friends making a payload is not as hard as we think. It’s a simple process. But we need to install some prerequisites before making a payload. If we will not complete these steps then we cant create payload in Termux. So let’s discuss what are these requirements for making a payload –

Continue reading “How To Create Payload Using Termux?”

What is Trojan And different Types of Trojan? How does Trojan work?

In this post I will discuss about Trojans that What are Trojans, How do trojan work, And How does trojan affect or devices. So let’s start –

Continue reading “What is Trojan And different Types of Trojan? How does Trojan work?”

What is NMAP? How to use Nmap For scanning? The Best Tool for information Gathering – NMAP

In this post, I will describe the open-source vulnerability scanning and network scanning tool that is NMAP.  The full-form of NMAP is network-Mapper. NMAP is a very popular tool. Because this tool is free and open-source and used world-widely to find any vulnerability in any system or to scan a network. We can gather much important information from this tool like operating system detection, host scanning, open ports, any security risk, and much more.

Continue reading “What is NMAP? How to use Nmap For scanning? The Best Tool for information Gathering – NMAP”

How To Install osTicket in Ubuntu. How To Setup Help Desk Support System in Ubuntu For Beginners.

In this article, I will explain to you the installation of the osTicketing System. So Friends as you know osTicket is an Open Source Helpdesk Support System which is used worldwide. We can manage and organize customer inquiries and complaints in one place. It provides us a user-friendly environment so it becomes very easy to manage the osTicket system.

Continue reading “How To Install osTicket in Ubuntu. How To Setup Help Desk Support System in Ubuntu For Beginners.”

India Plans to Ban On Cryptocurrency.

Is Indian Government Planning to Ban On Cryptocurrency? Yes, Indian govt. has planned to ban the cryptocurrency. They have introduced a new law that will not allow any user to invest in crypto trading. Indian govt. took this decision to keep stay with like other Asian countries in the fledgling market. According to some inspection, this bill will be discussed very shortly by the federal member before sending it to the parliament.

Don’t Know What is Cryptocurrency?

Read this –

A cryptocurrency (or cryptocurrency) is a digital asset designed to work as a medium of exchange wherein individual coin ownership records are stored in a ledger existing in a form of computerized database using strong cryptography to secure transaction records, to control the creation of additional coins, and to verify the transfer of coin ownership. It typically does not exist in physical form (like paper money) and is typically not issued by a central authority. ……( Wikipedia)

Related: – What is Bitcoin and Bitcoin Mining? How Does Bitcoin Works?

What is Bitcoin And How Bitcoin works
Crytpocurrency

In 2018, the Indian govt. suddenly banned te cryptocurrencies when there was a string of frauds in the months. During then the following Prime Minister decided to ban the crypto transactions. But since then Cryptocurrency regulates association fought a case against the Indian govt. In 2020 they got success and in may 2020 this ban was terminated but now in October the govt. again trying to ban the Crypto Trading.

If the Indian govt. bans the Crypto trading then it will affect more than 1.7 billion Indian Tradings in digital assets and a rising number of companies setting up a platform for the trade, according to data research.

Instead of a ban, India needs a regulatory framework to protect uninformed retail consumers “to ensure adequate oversight of the government and the RBI over cryptocurrency businesses,” said Sanjay Khan, Partner, Khaitan & Co, a New Delhi-based lawyer who advises firms. “India can actually benefit from such a regulation to attract cryptocurrency investors and businesses.”

 

Top 10 Android Apps To Convert Your Phone Into a Hacking Device.

In this article, I’ll discuss the apps which can convert your android device into a hacking Device. There are many apps and websites which can allow you to attack and access the data of your victim. But some of these are frauds or some of these charge amounts for their service. But the which I will tell here is free of cost and best of all apps and sites. Continue reading “Top 10 Android Apps To Convert Your Phone Into a Hacking Device.”

How To Become A Hacker? 15 Things to Do to Become Good Hacker.

In this article, I will share my personal experiences and skills on how anyone can become an ethical hacker. There are many videos and websites that talk about the advanced thing of ethical hacking. But no one talks about absolute beginners. Beginners have no idea about how they can enter the cyberspace field, so here I will talk about absolute beginners, who do not know the right way to enter cybersecurity and hacking.

Continue reading “How To Become A Hacker? 15 Things to Do to Become Good Hacker.”

What is Apache Web Server? How Does apache web server(HTTP server) work?

In this article, I’ll discuss What is Apache Web Server? How Does the apache web server(HTTP server) work?” So here you will learn the basics web server in a very simple way. When we configure the Apache server we must have some basic knowledge about this server. So let’s discuss the basic features of the Apache server Continue reading “What is Apache Web Server? How Does apache web server(HTTP server) work?”

How To Send Fake SMS To Anyone with Proof? Best Website For Sending Fake SMS without Identity?

Do you want to send fake SMS to Anyone without showing your Identity? In this article, I will explain The best way to send fake SMS to someone. Friends, The most important thing about this program is that we can send SMS as well as we can make fake calls to our victim anonymously. So, friends, you can use this to prank with your friends.

Continue reading “How To Send Fake SMS To Anyone with Proof? Best Website For Sending Fake SMS without Identity?”

What is Termux App? How To Use Termux? Basic Commands of Termux for Beginner.

What is Termux?

Termux is an Android Emulator and Linux Environment App. It is a minimal base system is installed automatically. It works with no rooting and additional setup. We can add additional packages to the Termux by APT packages. Termux doesn’t have a fancy interface like other apps have. It has a simple interface with text mode support i.e. minimal base support.

Termux is an Alternate of the Kali Linux OS that is used by hackers. So you don’t know about Kali Linux, Then you are too far from being a hacker.  Termux is also said as the Kali Linux of poor people. We know everybody can’t purchase a heavy system( Computer or a laptop). For those Termux, a Linux-based Android platform where they can learn penetration and hacking.

How To Use Termux?

Termux is a command-line android application. So to operate Termux you must be comfortable with the command line and to install the packages in Termux. Termux doesn’t give us an attractive lookup and we don’t have any button or menu bar to operate Termux. There are lots of commands which are used to operate Termux. But here in this article, I will talk about some of the important commands that are specially for Beginner. After learning these commands a beginner/fresher can easily run Termux.

How To Download Termux?

Termux is an open-source android application. So it is free to use. Anyone can download and use Termux without payment. We can directly download it from the Play store. You can also download the form link given below.

Download= TERMUX click here

Most Commonly Used Termux Commands

Navigation Commands

  • && – It’s, not a technical command but it can be used to run multiple commands at a time. Just put this command in the mid of all other commands. For eg. [command] && [command2]. Both commands will run at the same time, first command1 will show its output then command2 will be executed.
  • cd – It is used to change the current directory.
  • clear – It clears the terminal screen.
  • ls – displays or list the all items of the current directory.
  • man — displays the guide or manual of the command. For eg. $man ls [ displays the guide about what is ls command and how to use this command ]
  • pwd – displays the absolute path of the current working directory.
  • cd .. -It changes the current directory to the parent directory

File Management commands

  • cat —  It is used to display the content of a single file. For eg.
$cat linuxkings.txt
  • cp — makes a copy of the file. For eg.
$cp linuxkings.txt [path of the file where you want to copy it]
  • mv — moves the original file from one directory to another directory. For eg.
 $mv linuxkings.txt [path of the file where you want to move]
  • find — finds the exact match in the entire system or directory or file from the given query.
$find root
  • locate — It displays all possible output of a particular query in the entire system or directories. For eg.
 $locate root
  • rm — used to delete files/directory with certain parameters. It is used to delete a single file as well as multiple files.
$rm -rf linuxkings.com
  • mkdir — used to create a directory. For eg.
$mkdir linuxkings.com
  • nano/vim — Nano and Vim are the editors, used to edit the file. Nano is suitable for beginners because vim is a very complex editor to use. For eg.
$vim linuxkings.com
  • touch — used to create empty files with certain parameters. For eg.
$touch linuxkings.com

User Management Commands

  • whoami – displays the currently logged user.
  • who — also displays the currently logged user.
  • who -a — displays info about all users currently logged in.
  • ps — displays info about currently running processes.
  • kill/kill all -kill a single process and all processes running in the entire system.
  • useradd – adds a new user.
  • userdel – deletes user already created.
  • groupadd – adds a new group.
  • groupdel — deletes the group already created.
  • chown — changes the owner of the file/directory.
  • chmod – change the permission of the file like read, write, and execute for the users.

System Management Commands

  • df — displays the available space and used space on the system.
  • du — displays the block size of a file or directory
  • free — displays the  RAM space, used, and free space of RAM in the system.
  • ipconfig – displays the IP address of the system.
  • history — shows the commands history that has been used.
  • pkg — install packages directly from the APT repository.
  • uname — displays the core system information.
  • uptime — displays time elapsed since last boot.
  • cat /proc/meminfo — show memory-related info.
  • cat /proc/cpuinfo  –show CPU information

Where is the Home Directory of Termux?

All data of Termux home directory stored in  /data/data/com.termux/files.

How To Install Package in Termux?

In Termux it is recommended to use package manager pkg which is a wrapper for apt. It simplifies installing or upgrading packages by automatically updating apt lists so you don’t have to type apt update when installing or upgrading packages

Steps To Install packages-

  • Install Packages
pkg install [ package name]
  • Uninstall package
pkg uninstall [package name]
  • Upgrade Termux Packages
pkg upgrade
  • Update Termux Packages
pkg update
  • List all packages of Termux
pkg list-all
  • After Installing Termux, Install Official Repositories of Termux
pkg install root-repo
pkg install unstable-repo
pkg install x11-repo

Friends this is all about Termux that a beginner must know. Here I described, What is Termux? How to use Termux, and the Basic commands to run Termux, and many more about Termux.

So, friends, still if you have any doubts or any queries on this post, do not hesitate to contact me. If you like our post, then share it with your friends. And if you have any suggestions for me, please write to me in the comment box.

How To Send Fake SMS to Anyone? How to Send Anonymous SMS to Someone?

Do you want to send fake SMS to someone? In this article, I will explain how to send fake SMS to someone. Friends, we will send unlimited fake SMS with our phone. But here we do not need any mobile application to send SMS. The most important thing about this program is that we can send SMS as well as we can make fake calls to our victim anonymously. That’s the great thing about this tool. So, friends, we will use a scripted program to send fake SMS, this script allows you to send unlimited fake SMS / calls to your victim. So, friends, you can use this tool to prank with your friends. Now let’s start without wasting time-

Continue reading “How To Send Fake SMS to Anyone? How to Send Anonymous SMS to Someone?”