Linux – Page 2 – POFTUT

Category: Linux

0

What Is MD5 Hash Checksum? How To Create and Validate MD5?

MD5 is a checksum or hash calculation method for files. MD5 checksum consists of 128-bit value which is generally expressed as the hexadecimal format with which consist of 32 characters. MD5 Attributes MD5 is a cryptography algorithm which provides some attributes which make it useful for different cases like security, operation etc. Here is the list of MD5 attributes. MD5 checksums are 128-bit values MD5 checksums can be expressed in different...

0

What Is DNS Server Or Protocol Port Number?

Domain Name System aka DNS is used to match domain names to the IP addresses. DNS is provided over intranet and internet servers with different port numbers. TCP or UDP DNS can use both transmission protocols TCP and UDP. But general usage is over UDP protocol because of its simplicity and speed. TCP Port 53 One of the used DNS port is TCP Port 53. TCP provides stability over DNS...

0

How To Use Google Public DNS Servers?

Google is a huge company which provides paid and free services. It mainly operates in IT and internet area. Internet uses DNS in order to solve domain names into IP addresses. Because internet infrastructure works with IP addresses. Google provides free DNS servers which can be used for fast and free domain resolution. In this tutorial we will learn Google DNS features and how to use in Linux, Ubuntu, Debian,...

0

What Is My MAC Address Of Network Interface On Windows Or Linux?

MAC Address is used to identify a Network Interface Card uniquely in a layer 2 network. This address is used to transfer files between default gateway and host or computer. In this tutorial we will learn how to find a MAC address from command-line or GUI in operating systems like Windows and Linux. Windows ipconfig Command Line ipconfig command provides a lot of information about the network of the current...

0

What is Zenmap and How To Download, Install and Use In Windows, Linux?

Zenmap is an free and open source GUI designed to be used with nmap . Zenmap is multiplatform tool which supports Linux, Ubuntu, Mint, Kali, Fedora, CentOS,.. , Windows, Mac OS X, BSD etc. . nmap is very powerful tool for network scanning and vulnerability discovery but it is completely command line based. Zenmap can be used by novice users to scan network and discover vulnerabilities. Download Windows Windows version can be downloaded...

0

How To Scan Top Ports with Masscan?

masscan is an alternative tool to the popular nmap . Actually masscan provides very less of the nmap but provides some huge adventages. masscan is designed to be fast and performative. nmap have popular feautre named top ports which option is –top-ports to scan specified number of most popular ports. masscan also provides this options too. Nmap Top Ports We will start with scanning top ports in nmap . As stated previously we will use —top-ports option...

0

How to Lookup OUI (Organizationally Unique Identifier) In Linux

Network switches or Layer 2 technology Ethernet protocol uses MAC addresses in order to transfer frames between systems. MAC addresses are 48 bit value. This 48 bit value contains the device manufacturer ID as the first 24 bit. In this tutorial we will learn how to look, search and find the Organizationally Unique Identifier in Linux distributions like Ubuntu, Debian, Mint, Kali, Fedora, CentOS, RHEL etc. Mac Address As stated in...

0

Network Classless Inter Domain Routing (CIDR) Cheat Sheet

Internet and most of the network infrastructures uses IP Protocol. IP protocol uses IP addresses in order to connect different hosts and networks over globe. Classless Inter Domain Routing or CIDR is hierarchical IP addressing scheme used to set IP addresses to the hosts and network. Here we will learn how to calculate IP address, Network Address, Broadcast Address, Network Mask and provide these as cheat sheet. IP address, Network...

0

How To Find And Change SSH Port Number?

ssh  is default protocol used to manage remote systems which are mainly Linux and Network Devices. As it is working over network connection and uses TCP it has a default port number which is 22  . In this tutorial we will look how to change the default port number from client and server point of view. List Server Port Configuration Linux ssh server configuration is stored in /etc/ssh folder with a...

0

How To Configure Linux Wireless From Command Line with wpa_supplicant

wpa_supplicant is used to connect wireless networks. wpa_supplicant.conf  file is used to store related configuration file about the wireless network. Also wireless security policy is configured with this file. Install wpa_supplicant Package In most of cases the wpa_supplicant package is installed by default but we can use following commands in order to install this package. Fedora, RHEL, CentOS

Ubuntu, Debian, Mint, Kali

  Help wpa_supplicant More detailed help information can...

Enjoy this blog? Please spread the word :)