You can register an iTabCode account to be able to view iTabCode without ads. ( Registration is Free ) Register Now

linux system

  1. x32x01

    How to Delete files older than 30 Days in Linux

    It is a best practice to find and remove old or unused files from the Linux system after a certain period of time, as this will free up some space on the system, which can be used for some other purpose. Please make sure these files are no longer needed, as it will not ask for your confirmation...
  2. x32x01

    What is the difference between apt and apt-get command

    Most of us are often confused with the difference between apt and apt-get command This confusion prevails among all the users, including beginners and experienced. These command line tools are much similar in use to manage package operations which includes Installation, upgrade, and removal. In...
  3. x32x01

    How to Secure Nginx with Let's Encrypt On Ubuntu 20.04 / 18.04

    Introduction Any website that aspires to attract visitors needs to include SSL/TLS encryption for its domain. SSL/TLS certificates ensure a safe connection between your web server and browsers. Let’s Encrypt is a free certificate authority that allows you to set up such protection. It is the...
  4. x32x01

    How to Build Linux Kernel From Scratch {Step-By-Step Guide}

    Introduction The Linux Kernel is the foundation of the Unix-like operating systems. The kernel is responsible for communication between hardware and software and the allocation of available resources. All Linux distributions are based on a predefined kernel. But, if you want to disable several...
  5. x32x01

    How to List Running Processes in Linux

    Introduction Each application you use or a command you run on your Linux system creates a process or task. As a system administrator, you will need to manage processes to ensure optimal system performance. In this tutorial, we will cover different Linux commands you can use to list and manage...
  6. x32x01

    Install Docker in Kali Linux and Run Other OS

    Docker is a amazing system to run other Operating System in our primary OS Kali Linux. The system is not similar with VMWare or Virtual Box. Unlike the virtual machines, docker is a containers based system. VMWare runs the full size operating system over our primary system so it consumes lots of...
  7. x32x01

    How to Install VSCode on Kali Linux

    There are so many code editors in the market, but now many developers found liking Virtual Studio Code. In this community we have seen many of friends switched on Visual Studio Code (VSCode) from Atom and Sublime Text. VSCode is an awesome code editor, it's totally free also. In this brief...
  8. x32x01

    How to use Proxychains in Kali Linux OS

    There are a lot of hackers and crackers around the world, some are good, and some are evil. Hackers always want to be anonymous while doing their work. Tools can be used in order to hide the hacker’s identity from being exposed such as VPN (Virtual Private Network), Proxy Servers and RDP (Remote...
  9. x32x01

    Manipulating MAC and IP addresses with MICH in Linux

    You must be familiar with the term IP address. Just like your home has a mailing address in the same way any computer or device connected to the internet have a mailing address called the IP address and the distinctive address that identifies a NIC is called the Media Access Control (MAC)...
  10. x32x01

    Find Public IP Address From Command Line - 12 Examples

    The public IP address is what you see online when you access them from your computer. If you want to try to connect to your computer via a remote connection that isn’t on the same network, you’ll need the public IP address. You can easily determine the IP address or addresses of your Linux...
  11. x32x01

    Find Virtual Machine IP Through Kali Linux - 3 Methods

    While solving CTF or bug bounty challenges, sometimes you need to find out the IP address of the machine because that machine is not logged in at that time. We realize that some people who like to break stuff haven’t had experience in building stuff. No matter how good our skills are, we need...
  12. x32x01

    Get Linux IP Address from Command Line - 5 Ways

    What is IP Address A unique number consisting of four parts separated by dots. Every device on the Internet (and on any network) must have a unique IP address to participate and be part of it. An example of an IP address is: 192.168.1.1. This article will show you how to find the IP address of...
  13. x32x01

    Simple Random Password Generator - Command Line (LINUX)

    A brute-force attack is when all possible keys are checked against encrypted data until the right key is found. Brute-force attacks are extremely costly from a resource and time perspective because the attacker is exploiting vulnerabilities in the encryption by taking advantage of key length and...
  14. x32x01

    Test Your Internet Speed With Command Line Tool

    Would you like to know how fast your internet connection is? This can be done with an internet speed test. There are various tests on the internet to measure the speed of your connection. The below command line tool can easily show your up and download speed. When starting an Internet speed...
  15. x32x01

    Generate Random Password in Linux - Command Line

    There are plenty of ways to make your password secure, but most people just don’t bother. It is much easier to set a password that is easy to remember, but hackers rely on this to break into insecure sites. Try to at least make it hard to guess by making it eight characters or more, and throw...
  16. x32x01

    How to use kill, pkill and killall Commands to Kill any Linux Process

    UNIX treats every object in the operating system as a file. We can find the files associated with every action performed and can make use of them for different system- or process-related manipulations. A process, also known as a task, is the running form of a program. Programs are stored on...
  17. x32x01

    Privilege Escalation with PowerShell Empire and SETOOLKIT [Kali Linux]

    In a previous tutorial, we used PowerShell Empire v2.3.0 for post exploitation of Windows Operating System. The same can also be done with one of the most popular toolkit named as Social Engineering Toolkit (SETOOLKIT) which is already pre-installed in every Kali Linux flavor. In order to...
  18. x32x01

    Change Password Forcefully on Next Login (LINUX)

    Password is a key or a Secret word or a string of characters which is used to protect your assets or information from others in the cyber world. It is used for authentication, to prove our identity or to gain access to our own resources. It should be kept secret to prevent access by unauthorized...
  19. x32x01

    20 Useful Tar Commands For Extraction and Compression

    The Linux tar command stands for tap archive, is not a compressed file and commonly called as a collection (which contains the contents of many files) of a single file. Tar is the most commonly used command in Linux for creating a archive file. It saves multiple files, folders & other file...
  20. x32x01

    Linux System Reconnaissance [Top Linux Commands]

    In the early 90’s GNU/Linux systems consisted of little more than a beta – quality Linux kernel and a small collection of software ported from the GNU project. It was a true hacker’s operating system. There were no CD?ROM’s or GUI installation tools; everything had to be compiled and configured...
Top