Author: İsmail Baydan

1

locate Command Tutorial With Examples For Linux To Find Files

Linux have different tools to search and find files and directories. locate is one of them which is very popular. The alternative for locate is find command. But they work differently from each other. Find command searches in real time but locate command uses a database which holds all files and directories...

0

How To Exclude Hosts From Nmap Scan?

Nmap is very useful tool for network administration and security. It is most used tool in these areas. But a lot of people use it with very basic means. Here we will look more sophisticated usage of nmap step by step in this ant further posts. Target Hosts Create a...

0

How Configure Cisco For Logging?

Hi, collecting logs are important. In my daily job I am working with logs about a lot of systems like WMware , Application ,Linux,windows,Cisco ,checkpoint, pfSense. Logs provides info about the system, application etc. Security incident management systems heavily rely on logs. Example Log Logs consist of date system name and...

1

Linux Systemctl Service Management Tutorial

Hi, today we will learn managing Linux services with systemd or systemctl. While Linux kernel booting, it loads drivers, mount file systems, starting memory management, creating system calls etc. But after that what? Linux starts an init process to create further system and user services and processes. To manage system...

0

How To Generate Self Signed X.509 Certificates with OpenSSL?

Hi, x509 certificates are used widely by a lot of applications. Generating x509 certificates seem to be hard and rocket science, but it is not. We will generate a key named t1.key and then create a signing request from this key. After that to signed our request we will generate...

0

How To Generate Random Numbers In Linux?

Generating random numbers can be seem odd. But it is very important for security. In security field whatever best cipher or algorithm you use if you can’t generate random numbers it is useless from point of view of security. So how can we generate random numbers in Linux environment. Generate...

0

Linux Su Command Tutorial With Examples

The su short for substitute super user command using to change currently logged user.  This makes things practical because the user change made without login. Su command can be used to get root privileges too. Su and sudo commands have different ways to act for similar aims. Syntax

Man Man...

Enjoy this blog? Please spread the word :)