How to install Cerberus Linux SubSystem

Download Steps Start Windows PowerShell in the Administrator Command Prompt by typing: Copy: powershell

How To Install WiFi Driver in Linux

Step 1: Find available WiFi adapters – WiFi network from command lineThis actually help .. I mean you need to know your WiFi device name before you go an connect to...

5 Ways to Send Email From Linux Command Line

We all know the importance of emails these days for information transfer. There are many free emails service providers which we used for use like Gmail, Yahoo, RediffMail etc, which provides...

Raspberry Pi 3 Model A+ and new Raspbian Linux release

The Raspberry Pi Foundation made two significant announcements Nov 2018. First, the availability of the Raspberry Pi 3 Model A+, which has been eagerly awaited; then, the next...

Raspberry PI 3 model B+ Complete specs

Dual-band wireless LAN and Bluetooth are provided by the Cypress CYW43455 “combo” chip, connected to a Proant PCB antenna similar to the one used on Raspberry Pi Zero W....

Building a Hacking Kit with Raspberry Pi and Kali Linux

The Raspberry Pi has some unique features that are very powerful and easily accessible for a Hacking Kit. In particular, Pi is a joke and its components cost the price of...

WTF is FTP?

If you hang out with techy people, especially web developers, you might hear the letters “FTP” a lot. Maybe you just nod while pretending you know what it means, but seriously,...

The best free rootkit removal, detection and scanner programs

What is rootkit malware? A rootkit is a particularly nasty piece of malware that doesn’t behave like your typical virus. Rootkits insert themselves into the very heart of...

20 Linux Command Tips and Tricks That Will Save You A Lot of Time

You might already know a few of these Linux command tips or perhaps all of it. In either case, you are welcome to share your favorite tricks in the comment section. Some...

How to Turn an Android Phone into a Hacking Device Without Root

With just a few taps, an Android phone can be weaponized into a covert hacking device capable of running tools such as Nmap, Nikto, and Netcat — all without rooting the device.
Skip to toolbar