Blog Posts - Unix And Linux Utilities



Difference between a Hacker and a cracker

When most people think about computer security the word hacker comes to their mind. Another word that is also associated with bad computer behaviour is cracker and most of the time the two words are used interchangeably but they are not the same thin...
by Active hackers on Mar 8, 2011

What is Buffer Overflow Attacks

Buffer overflows are a favorite exploit for hackers. The vast majority of Microsoft's obtainable patches fix unchecked buffer problems -- but what about applications developed in-house? They're just as susceptible as commercial applications to buffer...
by Active hackers on Sep 13, 2010

Top 5 Network security Tools

1.Nessus:Premier Unix vulnerability assessment tool. Nessus was a popular free and open source vulnerability scanner until they closed the source code in 2005 and removed the free "registered feed" version in 2008. A limited "HomeFe...
by Active hackers on Mar 14, 2010

UNIX and LINUX utility

This is the first post in the article series about Unix and Linux utilities that you should know about. In this post I will take you through the useful lsof tool. If netcat was called the Swiss Army Knife of Network Connections, then I’d call l...
by Active hackers on Mar 8, 2010

This is the first post in the article series about Unix and Linux utilities that you should know about. In this post I will take you through the useful lsof tool. If netcat was called the Swiss Army Knife of Network Connections, then I’d call lsof...
by Active hackers on Feb 3, 2010


Trending Topics

Close