Synergy! as many PCs as you like with just one keyboard and one mouse!

Article by Giuseppe Sanna If your desk is like mine: you have multiple PCs and Laptops spread over two square meters, but do not worry I have the solution for you! Install Synergy and you’ll just say goodbye, once and for all to the mess! This software, which I emphasize is cross-platform, allows you to […]

5 types of very annoying Linux users

Original article by Perro, published in Spanish on the site http://paraisolinux.com/ Since I use Linux for several years now I’ve found Linux users of all kinds, having a blog has helped me to identify many types of Linux users. But of all the guys there are some that are very annoying and I will try […]

Pipes – what are they and Example of Use

Unix based operating systems like Linux offer a unique approach to join two commands on the terminal, with it you can take the output of the first command and use it as input of the second command, this is the concept of pipe or | . Pipes allow two separate process to communicate with each other also […]

Understanding Nmap Commands: In depth Tutorial Part II

Article by James Hawkins This is the second part of our guide on Nmap, you can find the first part here, in this part of the tutorial we’ll see other configurations that you can use with Nmap to avoid firewalls or debug the information obtained.

Understanding Nmap Commands: In depth Tutorial with examples

Article by James Hawkins As we all know, Nmap (Network Mapper) is a stealth port scanner widely used by network security experts (including forensics & Pen-testing Experts). In this article we’ll see the different types of Nmap Scans, its techniques, understanding the purpose and goals of each scan , its advantages or disadvantages over other […]