Khalil Khan AfridiforCYBER CHIFcyberchief.hashnode.net·Oct 28, 2022Python libraries for System Administrators, Penetration Testers, and HackersCybersecurity engineers and penetration testers largely depend upon Python to perform a wide range of their day-to-day tasks. Python is a widely used programming language in the fields of data science, machine learning, AI, automation, and informatio...Discuss·85 readsinformation security
Yusuf Al AfidforUUCPuucp.hashnode.net·Feb 9, 2023Device Mapper Multipath on CentOS 7.9Topology iSCSI Target Node 2 vCPU 4 GB RAM 50 GB OS Disk 100 GB Backed Disk iSCSI Initiator 2 vCPU 4 GB RAM 50 GB OS Disk iSCSI Target Configurations Setup backing storage device # fdisk /dev/sdb Command (m for help): n Partition ty...DiscussLinux
Sean MilfortforSean Milfort's Tech Blog!seanmilfort.hashnode.net·Jul 29, 2022SSH w/o a Password!SSH, which also stands for Secure Shell, is something that I currently use to connect to my Linux machines to run maintenance on them. I have a couple of Linux-based machines that I routinely need to log in to either fix something or apply some kind ...Discuss·84 readsDeveloper
Ameye OlayinkaforOlayinka's RH124rh124byameye.hashnode.net·Apr 24, 2023Chapter 7: Control Access to FilesWelcome to Chapter 7 of my RH124 course blog! In this chapter, I'll be sharing my hands-on experience with controlling access to files in Linux. I'll walk you through how I tackled each lab task, from listing file system permissions to interpreting t...DiscussLinux
Yusuf Al AfidforUUCPuucp.hashnode.net·Feb 9, 2023Device Mapper Multipath on CentOS 7.9Topology iSCSI Target Node 2 vCPU 4 GB RAM 50 GB OS Disk 100 GB Backed Disk iSCSI Initiator 2 vCPU 4 GB RAM 50 GB OS Disk iSCSI Target Configurations Setup backing storage device # fdisk /dev/sdb Command (m for help): n Partition ty...DiscussLinux
Godlove Damianforgodlove.hashnode.net·Feb 8, 2023The Linux File System Structure: Understanding the Basic ArchitectureIn Linux, the file system structure is a hierarchical arrangement of directories and files. Understanding the basic architecture of the file system is important for managing and organizing data efficiently. In this blog, we'll explore the key directo...Discuss·37 readsoperating system
Khalil Khan AfridiforCYBER CHIFcyberchief.hashnode.net·Oct 28, 2022Python libraries for System Administrators, Penetration Testers, and HackersCybersecurity engineers and penetration testers largely depend upon Python to perform a wide range of their day-to-day tasks. Python is a widely used programming language in the fields of data science, machine learning, AI, automation, and informatio...Discuss·85 readsinformation security
Sean MilfortforSean Milfort's Tech Blog!seanmilfort.hashnode.net·Jul 29, 2022SSH w/o a Password!SSH, which also stands for Secure Shell, is something that I currently use to connect to my Linux machines to run maintenance on them. I have a couple of Linux-based machines that I routinely need to log in to either fix something or apply some kind ...Discuss·84 readsDeveloper