Linux Tutorials
Password Hashing And Why We Need It Paid Members Public
As a web developer, you must have come across the term password hashing at least once. Let us quickly understand what is password hashing and why we even need it. What is Password Hashing? Password hashing is the process of encrypting a user’s password before storing it into a
10 Linux Commands For Network Diagnostics Paid Members Public
It is difficult to find a Linux computer that is not connected to the network, be it server or workstation. From time to time it becomes necessary to diagnose faults, intermittence or slowness in the network. In this article, we will review some of the Linux commands most used for
Installing Vundle: The Plugin Manager For Vim Paid Members Public
Today, this guide will present a step-by-step guide of how to install and configure Vundle (Vim Bundle) from GitHub, and what issues you may face when installing Vundle. As many of you may know, vim is a console-based text editor that has numerous advanced features. One such feature is that
How To Install Kali Linux Tools In Ubuntu Paid Members Public
Today I am going to do a quick demonstration of how to easily install a suite of security testing tools from Kali Linux onto a Ubuntu machine. For a bit of background information, Kali Linux is a distribution derived from Debian. Its sole purpose is to provide a suite of
Difference Between Malware, Viruses, Worms, Spyware, Trojans And Ransomware Paid Members Public
The latest attack of a worldwide malware, the already famous WannCrypt, has not only made clear the security of hundreds of companies in the world but also how much we sometimes get involved in handling the terminology of these threats. Is a virus the same as a malware? And what
MongoDB Vs. MySQL Paid Members Public
The past few years have seen a huge spike in the number of websites and apps using NoSQL databases. With MongoDB topping the charts everywhere. It is indeed fascinating how the modern web has drifted away from traditional SQL based databases. MongoDB and other NoSQL databases have a new approach
What Is Tor? Is Tor Safe? Paid Members Public
In this time where everybody is attempting to ensure their information and protection, we hear a considerable measure about the TOR network. Some sing acclaim while others think of it as an apparatus for crooks. In this article, we give you the working standards of TOR by portraying likewise its
How To Improve Typing Speed For Free Paid Members Public
Ever met a friend who could type 50+ Words Per Minute easily? Surely you must have already met one or many ? And if we ask them how they were able to do it, their response would vary because some would mention a very cool proprietary program while others would mention