#linux
Read more stories on Hashnode
Articles with this tag
The first thing for a hacker is to know more about a particular IP for this he may use tools such as nmap which is used for port scanning, OS...
In kali linux you can create a fake AP or AP's very easily which is seen by the clients trying to connect to wifi. To do this kind of process you need...
Imagine that you are creating a script that lets user selects one file out of many files in directory. well this can be achived in different ways The...
Running a co-process in the background can be achieved by using & operator or coproc command. the only difference is that coproc allows to read and...