Adding a default route in Linux is easy. The route command is the best way to do this. route add default gw 172.18.31.1 I used this command on a machine that previously had an IP address in the 192.168.0.xx range and the default gateway was 192.168.0.1. So I had to change it and this command … Continue reading Adding a default route in Linux. How to define the default gateway.
To scan a network for hosts using Kali Linux, the netdiscover command will come in handy. Just give it an IP address and it will find all hosts within that range. I am scanning for all hosts within the range of 172.29.59.1 to 172.29.59.254. root@kali:~/Documents# netdiscover -r 172.29.59.0/24 Currently scanning: Finished! | Screen View: … Continue reading How to scan a network for responsive hosts using Kali Linux.
I installed Ubuntu server 14.03 in a Virtual Machine and after installation the Internet connection was not working. To fix this I added the nameservers to the /etc/resolv.conf file like this. nameserver 188.8.131.52 nameserver 184.108.40.206 After saving this file, I ran this command. sudo service resolveconf restart This fixed the issue with the Internet connection … Continue reading How I got the Internet connection working in Ubuntu server 14.03.
Kali Linux runs very well in a VM, but having copy and paste to and from the Virtual Machine is very helpful. To get this working in VMware Pro 12, install these packages. Firstly, this one. root@kali:~# apt-get install open-vm-tools Then this one. root@kali:~# apt-get install open-vm-tools-desktop Then copy and paste to and from a … Continue reading Enable copy and paste to and from a VMware Kali Linux instance.
Installing Ubuntu server is quite straightforward. Firstly, choose the language. Then the user needs to choose what country they are in. And choose what keyboard layout you are using. After this is out of the way, we get to the main installation tasks. We need to choose a hostname for our server instance. Now we … Continue reading How to install Ubuntu server and setup a simple LAMP instance.
Movie theater staff are planning to wear military styled night vision googles to fight against movie piracy. This will allow them to see anyone who is using a camera to film a movie and create a camprip to upload to a movie sharing website. This is in Britain. But if someone uses a camera flash … Continue reading Movie theater staff to wear NVG goggles to fight against movie piracy.
I’m sure most everyone has had the following scenario happen once or twice during there lifetime of owning a computer, or an email for that matter… …you login to your email account to catch up on work, personal emails, etc. The first email you see is from your mom. The subject line is a little weird but you don’t think much of it. You open the email that contains a link, which you click to open without so much as batting an eye, and BAM, just like that your email has been hacked. #epicbummer. With phishing, Malware, spam, etc. etc., how is one supposed to protect their computer, files, and sensitive information from being stolen? For starters you need good software to protect your computer. Whether you own a Mac or a PC I have researched high and low to bring you the recommendations for the best protection software for your computer. However, before I get into the best software to protect your computer there are a few terms you need to be familiar with. Firewall:A system designed to prevent unauthorized access to or from a private network. Parental Control Software:A special browser or filtering program designed to reject Web sites not suited for children. Web Protection Software:Content-control software. Phishing:The attempt to acquire sensitive information such as usernames, passwords, credit card details, etc by masquerading as a trustworthy entity in an electronic communication. Malware:Software that is intended to damage or disable computers and computer systems. Spam Filtering:A program used to detect unsolicited and unwanted email and prevent those messages from getting to a user’s Inbox. Mac Security ClamXav: This software gets rave reviews for its excellent Antivirus protection. This software also scores big for being simple to use, free, and offers continuous protection for some versions. The downfall to this software is that there is no firewall offered, parental controls, or web protection. Intego Mac Internet Security($39.99): This software offers Antivirus protection, firewall protection, and parental controls for it’s Pro users. This software also scans windows and unix malware. Downside is there is no browser protection. Sophos AntiVirus for Mac: Sophos comes complete with Good Antivirus protection and excellent web protection. However, it lacks firewall tools and has zero parental controls. PC Security McAfee AntiVirus Plus 2015 ($49.99): McAfee is a very common AntiVirus Software. It scores high ratings for its malicious URL blocking. The only complaint with this software is that the firewall seems a bit lax. Trend Micro internet Security 2015 ($79.95): This protection software is well worth it’s hefty price tag when you consider that is has excellent reviews in blocking malicious URLs, phishing protection and offers PC health checkups built into the AV scan. This software also check social media privacy settings. One downside is the parental controls are very basic. Trend Micro Antivirus 2015 ($39.95): Supberb in blocking malware, malicious URL, phishing protection, and spam filtering. This software also offers a firewall booster and URL rating system. ContentWatch Net Nanny 7($39.99): This software is aimed towards protecting your family. Supports Windows, Mac, and Android. Very Powerful filtering system that offers the option of having email notifications sent to the user. This software offers internet filtering, blocks pornography, time management, social media monitoring, child protection software, profanity masking, alerts and reporting, and the ability for remote management. FREE PC Software Panda Free Antivirus 2015: This software is easy and quick to install. It offers excellent malicious URL blocking and malware blocking. Malwarebytest AntiMalware 2.0: This software can be installed and will scan while in Safe Mode. This software has chameleon technology that resists malware attacks. An excellent malware remover. Conclusion With so many high quality protection software options available for your computer terms like malware, phishing, and spam wont keep you up at night. Choose the software that bests fits your needs and install it today! Don’t wait until your email has been hacked or your personal information has been compromised. Author Bio: Seven time winning ‘Best of State’ web development firm. Be sure to connect with ObjectiveInc for more ….
This simple script will help create new user accounts on a Linux system. This is very useful when administering a Linux machine and it is necessary to create a few user accounts. #!/bin/bash clear trap "" SIGHUP SIGINT SIGTERM SIGTSTP # Get username, check if its taken, and if it is the … Continue reading A simple shell script to create a new Linux user account.
This simple command will print the remaining free space on your hard disk. root@ip-172-31-20-16:~# df -Hla Filesystem Size Used Avail Use% Mounted on /dev/xvda1 32G 9.6G 21G 32% / proc 0 0 0 – /proc sysfs 0 0 0 – /sys none 4.1k 0 4.1k 0% /sys/fs/cgroup none 0 0 0 – /sys/fs/fuse/connections none 0 … Continue reading Simple Linux commands to get information about your system.
Many people are using wireless networks with WPS turned on. This allows a user to enter a pin or press a button to allow a new device to connect. But this approach will fall easily to brute force attacks unless the router has rate limiting enabled, this prevents brute forcing the WIFI, although even this … Continue reading Why you should always turn off WPS on your wireless network.
The steghide application for Linux allows a user to embed a file inside an image that may then be retrieved by another person who knows the passphrase. The example below shows how to embed one image inside another. I am sending a secret image, a Gnome icon of an AC adapter and I am embedding … Continue reading How to embed one file inside another with steghide.
Sun shining through grapes on the vine: Wallpaper. Black and white brick wall wallpaper: Wallpaper. Amanita mushrooms and glowing butterflies: Wallpaper. Concrete texture 1080p: Wallpaper. Old Ford car dashboard: Wallpaper. Rocky Mountains mobile wallpaper 1080p: Wallpaper. Railroad tracks glowing in afternoon light: Wallpaper. Push for the end mobile wallpaper: Wallpaper. More HD mobile wallpapers: http://mwp4.me/1080×1920/. … Continue reading Some awesome Android or Apple wallpapers for your phone.
This program will return the IP address of a specified network interface. Use the –ip parameter to get the IP. For example, this will show the IP address of an ethernet interface: ./a.out –ip eth0. #include <stdio.h> #include <string.h> /* for strncpy */ #include <unistd.h> // for close #include <sys/types.h> #include <sys/socket.h> #include <sys/ioctl.h> #include … Continue reading Simple program to return the IP address of an interface.
The Nvidia drivers I am using with my Nvidia GT 740 are not working too well at the moment. I have to use nomodeset to get the desktop to come up. That is very annoying when the card works perfectly on Windows. That really needs to be fixed, Ubuntu is not a proper contender for … Continue reading Linux Nvidia drivers not working too well in Ubuntu 15.04.
The default Linux behavior allows the user to gain root access by typing su and entering the root password to gain a root prompt. If you wish to disable this behavior, then run this command: vim.tiny /etc/pam.d/su then uncomment this line: #auth required pam_wheel.so use_uid This will require a user to login as root at … Continue reading How to disable the su to root in Linux using PAM.