Categories
Linux Installation

Blackarch Install Virtualbox

How to install Blackarch Install Virtualbox black arch installation Open your Virtualbox and Click New Button and Follow Step Blackarch-Install Name and operating system Name: Any name Machine: Set default Type: Linux Version: Arch Linux (64-bit) <choose your according 64/32> Next Memory Size choose your uses according to ( 4 GB Recommended) Hard disk and […]

Categories
errors fix

VLC is not supposed VLC Fix

Today I will tell you how you can solve the problems coming in VLC media player in kali linux. VLC is not supposed. How to fix VLC Media player in Linux error fix VLC is not supposed VLC is not supposed to be run as root. Sorry. If you need to use real-time priorities and/or […]

Categories
Linux Installation

Ubuntu-Server install Virtualbox

Latest Ubuntu server download here Ubuntu-Server install Open you Virtualbox and click new buttons Name: Put Your server name Machine Folder: default Type: Linux Version: I am using Ubuntu (64-bit) you use any Click Next Button Virtual Ram: Create your virtual ram according to uses 1 GB recommended click Next Virtual Hard disk: Create a […]

Categories
AWS ethical hacking

DNS Server File Explain Records

DNS ( Domain Name System ) stands for Domain Name System. The main function of DNS is to translate domain names into IP Addresses Whether you’re accessing a website or sending e-mail, your computer uses a DNS server to look up the domain name you’re trying to access website try with an example What mean […]

Categories
basic linux commands

ls command Linux | ls command in Unix

Today I will tell you how you can use the Kali Linux in ls command and where it is used. ls command in Linux, ls meaning, ls commands in Unix, Linux list directories ls command Linux is mostly using list ls is a Linux shell command that lists directory contents of files and directories command […]

Categories
ethical hacking What is - How to

Linux File Permissions

Overview of Linux Permission In Unix and Unix-like operating systems, chmod is the command and system call which is used to change the access permissions of file system objects. It is also used to change special mode flags. Every file or folder in Linux has access permissions There are three types of permissions Linux Permissions […]

Categories
ethical hacking What is - How to

Linux Group file Understanding.

Overview of Linux /etc/group file /etc/group is a text file that defines the groups to which users belong under Linux and UNIX operating systems. Under Unix / Linux multiple users can be categorized into groups. Unix file system permissions are organized into three classes, user, group, and others. as shown in the photo. 1 group […]

Categories
ethical hacking What is - How to

Understanding /etc/passwd File.

Overview of passwd file Understanding /etc/passwd The /etc/passwd File. /etc/passwd is a text file that contains the attributes of (i.e., basic information about) each user or account on a computer running Linux or another Unix-like operating system. … Each line contains seven attributes or fields: name, password, user ID, group ID, geck os, home directory, […]

Categories
ethical hacking What is - How to

VI Editor modes Overview

The VI editor modes is the most popular and classic text editor in Linux. VI editor has three modes of operations Insert mode Ex Mode (Extended Command Mode) Command Mode Insert Mode I – Insert the text at the current cursor position a – Adds the text after the current cursor position A – Adds […]

Categories
ethical hacking Penetration Testing What is - How to

Grub Password Protect Kali-Linux.

Today i will tell you how you can Protect Youe Kali Linux Grub. How to Protect Grub Boot Loader by Password in Kali Linux first I am generating a new password for grub this command After generating our password edit grub file I am using vi editor you use any editor Copy your generated password […]