Exploits Para Linux Search Results

How to Use Linux: Commandline Dependencies with gdebi

In this tutorial, we learn how to use Linux: Commandline Dependencies with gdebi. First, download a Deb file then use dpackage to install the package on the command line. If this fails, you will be able to use gdebi to install all the dependencies in command mode. This will save you time from trying to figure out how to open your file any other way. When you are finished, you will be able to open you file and enjoy what's inside. If you aren't familiar with how this works, search the internet...

How To: Boot Windows or Ubuntu from a USB flash drive

Create a bootable USB flash drive to keep an extra OS of Windows or Ubuntu. You always want to have a copy of your Linux or Windows operating system on a separate device other than your computer. Because even if your computer or laptop is relatively new, it's very easy for some random fluke - an internal error or virus - to completely shut you down when you least expect it.

How To: Use Backtrack security software

A basic tutorial from InfinityExists.com on using Backtrack - the Linux-based security software package. This tutorial covers: Where to get Backtrack 2, How to burn an .ISO file, How to boot Backtrack 2, How to login, and start the GUI interface. It also illustrates basic Linux commands, and how to set up your Network Interfaces.

Where Do I Start: Learn the Fundamentals

I am very new to Null Byte but I find much of its content and community incredibly interesting. I spent quite a bit of time just chronologically going through the posts and I noticed a common theme in many of the beginner posts. Many people seem to want to know the 'secret' or a paragraph on "How to Hack" and become a hacker in a few minutes. I started off this post as a reply to a question from a beginner but thought it might be beneficial to have for those stumbling across this site.

Hack Like a Pro: How to Install BackTrack 5 (With Metasploit) as a Dual Boot Hacking System

Welcome back, my hacker novitiates! Many of you have written me that you're having difficulty installing and running Metasploit on a variety of platforms. No matter if you're using Mac, Linux, or Windows, I strongly recommend you install BackTrack as your secondary OS, a virtaulization system, or on an external drive. This particular Linux distribution has many hacking and security tools integrated—including Metasploit.

How To: End shutter lag, improve WiFi performance and more

Find which airlines Google is providing free Wi-Fi on this holiday season, fix shutter lag on digital cameras, wipe your hard drive for free, improve your Wi-Fi router performance, adjust your television and monitor for accuracy, choose the best 1080p projector, use a single server that can handle OS X, Windows & Linux simultaneously, and use the best audio encoding system for Windows Media Center and Zune.

How To: Set up OpenGL and GLUT on Linux for C++

Before you can start making awesome 3D games on your Linux computer using C++, then you're going to need to download and install these developer programs. This video lesson will show you how to download and set up OpenGL and GLUT for C++ on a computer running a Linux operating system, so you can start making 3D programs.

How To: Exploit Remote File Inclusion to Get a Shell

A simple security flaw can allow an attacker to gain a strong foothold with little effort on their part. When a web application permits remotely hosted files to be loaded without any validation, a whole can of worms is opened up, with consequences ranging from simple website defacement to full-on code execution. For this reason, RFI can be a promising path to obtaining a shell.

Hack Like a Pro: How to Use Maltego to Do Network Reconnaissance

Welcome back, my greenhorn hackers! Before we attempt to exploit any target, it is wise to do proper reconnaissance. Without doing reconnaissance, you will likely be wasting your time and energy as well as risking your freedom. In previous guides, I have demonstrated multiple ways to perform reconnaissance including passive recon with Netcraft, active recon with Nmap or hping3, recon by exploiting DNS or SNMP, and many others.

How To: Tell if your hard drive is failing in Ubuntu Linux

With this video, we learn how to tell if your hard drive is failing in Ubuntu Linux. If you have a failing hard drive, it will start making noises like clicking or grinding. If you hear these noises coming from your hard drive, you will need to get a new one before it fails completely and you lose all your data. You could have a failing hard drive but it doesn't make any noises. Hard drives come with a monitoring system so you can see what shape the hard drive is in. To see this, open up the ...

How To: Install Truetype Fonts on your Linux system

Shawn Powers teaches us how to install Truetype fonts on your Linux systems. First, log onto your web browser and go to Halloween Fonts. Once on this site, browse through the different types of fonts until you find one that you like. After this, save the file for the font onto your desktop. Now, install this font on your command line by first unzipping it. Go to the user share Truetype folder, then make a new custom folder. Move the file into the folder, then make sure the font and the folder...

How To: Delete temporary files in Ubuntu, Linux Mint or Debian

This video tutorial in Computers & Programming category will show you how to delete temporary files in Ubuntu, Linux Mint or Debian. For this you will need the program called bleachbit. You could get it from Bleachbit Sourceforge/ or from Synaptic package manager. For synaptic manager, click on ‘package manager’ in the ‘start’ menu and log into the program by typing your password. Then search for ‘bleachbit’, download and install it. Go to ‘terminal’, type in ‘su’ and enter, then type in your...

How To: Install and setup JDownloader on Ubuntu Linux

In this video, viewers learn how to install and setup JDownloader on Ubuntu Linux Downloader is open source download manager. It simplifies downloading files from One-Click-Hosters like Rapidshare.com or Megaupload.com - not only for users with a premium account but also for users who don't pay. It offers downloading in multiple parallel streams, captcha recognition, automatically file extraction and much more. Of course, JDownloader is absolutely free of charge. This video will benefit those...

How To: Secure your data with GNU's PGP implementation, GPG

In today's time of rampant information crimes, including identity theft, security is more important to the average computer user than ever. This tutorial from Linux Journal Online shows how you can use GnuPG to secure and verify data on your Linux box. (This video was created using only free and open source software tools: TightVNC, pyvnc2swf, ardour2, audacity, jackd, LAME, kolourpaint, cinelerra-cv, mjpegtools, and ffmpeg.)

How To: Exploit Java Remote Method Invocation to Get Root

In the world of technology, there's often a trade-off between convenience and security. The Java Remote Method Invocation is a system where that trade-off is all too real. The ability for a program written in Java to communicate with another program remotely can greatly extend the usability of an app, but it can also open up critical vulnerabilities that allow it to be compromised by an attacker.

Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 10 (Manipulating Text)

Welcome back, my aspiring hackers! As mentioned several times in previous Linux tutorials, nearly everything in Linux is a file, and very often they are text files. For instance, all of the configuration files in Linux are text files. To reconfigure an application in Linux, we simply need to open the configuration file, change the text file, re-save, and then restart the application and our reconfiguration is applied.