We know that nowadays if anyone of us finds free open WiFi our happiness is at the next level. Well doesn’t it sound super cool to hack someone who is using the same open WiFi which we are using? If yes then let’s check out a way to make this thing happen.
[mai mult...]IP Filtering in Wireshark
Wireshark is a network packet analyzer or tracer. Network Packet Analyzer displays captured packet data in as much detail as possible. It is a popular open-source network protocol analyzer used by ethical hackers to analyze network traffic to identify vulnerabilities or potential security breaches.
[mai mult...]Linux Firewall
A virtual wall in the security system world is designed to protect our system from unwanted traffic and unauthorized access to our system. The security system in Linux OS is known as Linux Firewall, which monitors and governs the network traffic (outbound/inbound connections). It can be used to block access to different IP addresses, Specific subnets, ports (virtual points where network connections begin and end), and services.
We have a daemon’s name called Firewalld which is used to maintain the firewall policies. A dynamically managed firewall tool in a Linux system is known as Firewalld, it can be updated in real-time if there are any changes in the network environment.
[mai mult...]Getting hash of a file using CMD
A cryptographic hash is a fixed size string (or text) that is used as an identifier/fingerprint of some data. These are particularly useful in determining the integrity of files after they are transferred over a communication channel. Hashes are even utilized by certain OS-level processes for their working.
The command processor of Windows OS (cmd.exe) provides the user with the ability to compute hashes on files/Directories via an utility command named Certutil.
[mai mult...]Assoc cmd command
Assoc is command (internal) found inside Windows Command Processor Command Prompt, that allows for file extension to file type association. A file extension is generally last few characters in File Name after period (“.”). Though it is not mandatory for file to have an extension at all (in case of extension-less files).
Extension to file type association is enforced predominantly by Windows OS. Other Operating Systems such as Linux and macOS does support such association but don’t enforce them to levels of Windows. Linux Kernel rather utilizes Magic Numbers for recognition of file types. In this article, we will take look at assoc command found in cmd, and would look at uses of it.
[mai mult...]Insert Image in a Jupyter Notebook
There are a few ways to insert images. These are:
- Direct insertion using the edit menu
- Embedding in a markdown cell
- By python code (embedding an image in a code cell)
How to convert IPython notebooks to PDF and HTML?
Sometimes according to our necessity, we would want to share or convert the Jupyter notebook to HTML or pdf format. Our Jupiter Notebooks can be easily converted to PDF and HTML files. You may access your notebook as a PDF with only a few simple steps.
[mai mult...]How to uninstall jupyter
Uninstalling Jupyter on Windows
The Jupyter software and its related components must be removed from your computer in order to completely uninstall Jupyter on Windows. You can follow the instructions in this manual to completely uninstall Jupyter.
[mai mult...]How to find Trojan on Computers?
What are MTP3 Windows in Wireshark
Wireshark is a free and open-source packet analysis tool that lets you capture and analyze network traffic in real time. In this article, we will learn about the Telephony Menu Function in Wireshark. and what are the components used inside the Telephony Menu Function also see the overview of Wireshark.
[mai mult...]