Exploits Para Linux Search Results

Hack Like a Pro: How to Use Metasploit's Psexec to Hack Without Leaving Evidence

Welcome back, my fledgling hackers! It's been awhile since we did a Metasploit tutorial, and several of you have pleaded with me for more. I couldn't be happier to oblige, as it's my favorite tool. For the next several weeks, I'll intersperse some new guides that'll help expand your Metasploit skills and keep you abreast of new developments in Metasploit, so look for them in the near future.

Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 2 (Creating Directories & Files)

In my first tutorial on Linux basics, I discussed the importance of hackers using Linux and the structure of the directory system. We also looked briefly at the cd command. In this second Linux guide, I'll spend a bit more time with changing directories, listing directories, creating files and directories, and finally, getting help. Let's open up BackTrack and getting started learning more Linux for the aspiring hacker.

How To: Fix broken AVI files with DivFix++ on Ubuntu Linux

Broken AVI video files are your worst nightmare. Nobody wants to watch a video and find out it's corrupted and not working anymore. But there could be a solution on Linux. This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to fix broken AVI files with DivFix++ on Ubuntu Linux.

How To: Configure Grub 2 for Linux

Linuxjournalonline teaches you how to use GRUB to dual-boot Linux and another operating system. You need to go to etc/default/grub and edit that file. Here you can configure the time it needs to start booting a system and what OS to boot. You need to be root to edit this configuration file. Don't forget to run update-grub to force an update of grub.cfg. And this is the end of the short process needed to configure Grub 2 for Linux.

How To: Use panels in Ubuntu for quick access to applications

Ubuntu Linux offers panels that you can create and customize to launch your most commonly used programs and applications quickly and with ease. Ubuntu panels and the applications launcher are found at the top of your screen–at least initially. This video tutorial offers step-by-step instructions for customizing your own Ubuntu panels. For more information on using panels within Ubuntu Linux, take a look!

How To: Send email with Evolution in Ubuntu Linux

Sending email with the Evolution client in Ubuntu Linux is much the same as with any other email program. In addition to offering step-by-step instructions for the setup and use of Evolution, this Ubuntu tutorial also will teach you how to access your address book when writing an email. For a detailed look at the Evolution email client, take a look!

How To: Install Linux Mint 7 inside Windows Vista

In this tutorial, we learn how to install Linux Mint 7 in Windows Vista. Use Sun Virtual box to download the Linux Mint 7. When finished, open up the program and click the install button, then go through the install process to finish installing the Linux program. You can go through the default settings or you can choose your own. When it's finished installing, create a name and password, then choose if you want to log in automatically. When finished, you will have the operating system up, the...

News: Explosive Polymerization Is Basically Magic

This video is by Adrian McLaughlin, aka plasticraincoat1 on YouTube, who shows us one of the most magnificent examples of explosive polymerization ever. In the video, what appears to be about 1/2 tsp of p-nitroaniline (which is short for para-nitroaniline, which is also referred to as 4-nitroaniline) is treated with a few drops of concentrated sulfuric acid, in a ceramic dish, over a Bunsen burner flame.

How To: Up Your Linux Game with This $19.99 Bundle

When we think about operating systems, we tend to view them from the perspective of a user. After all, most of us have spent a substantial amount of time on our computers, and so we've become more than acquainted with the ins and outs of whatever system we have running on our personal device. But there is one operating system that, while being less commonly used on the user side, is behind a great deal of design and business technology: Linux.

How To: Abuse Vulnerable Sudo Versions to Get Root

Anyone who has used Linux long enough is familiar with sudo. Short for superuser do (or substitute user do, depending on who you ask), it allows users to run commands as either root or another user on the system. From a hacker's point of view, sudo is often all that stands between them and root access. We'll be exploring an older vulnerability in sudo that allows a user to run commands as root.

How To: Crack Shadow Hashes After Getting Root on a Linux System

After gaining access to a root account, the next order of business is using that power to do something more significant. If the user passwords on the system can be obtained and cracked, an attacker can use them to pivot to other machines if the login is the same across systems. There are two tried-and-true password cracking tools that can accomplish this: John the Ripper and Hashcat.

How To: Activate Linux windows without losing selected text

In this video, we learn how to activate Linux windows without losing selected text. To avoid losing the texts, you can just click on the title bar so that the highlighted part doesn't remove. If you don't want to do this, there is an alternative. Simply mouse over the text that you have highlighted and scroll with the wheel that's on your mouse. After this, right click on the text and then you can copy what you need to. Now, you can go back to the other window you have open and paste it in, t...