Organizers of the Linux Australia conference have revealed that personal data of delegates may have been exposed after a hacker was able...
Mozilla has released the latest version of its Firefox browser with a brand new security feature by improving the way encryption is...
The list of organizations mentoring this year’s GSoC- Google Summer of Code 2015 – has been released and this list is having...
Alright here is the method, on how to host your website on Linux server (vps). Since these days you can see hosting...
Today I am going to show you on “How to host your website on Linux VPS (WordPress).” The reason why we are going...
This post is for so many of the people in the community asking for and having problems installing Kali Linux. Here is...
The developers at Offensive Security are back with yet another great version of Debian-derived Linux distribution Kali Linux version 1.10. Kali Linux 1.1.0 was...
Security vendor Qualys announced on Tuesday that a flaw in the popular component of many Linux distributions which would ultimately allow hackers...
Linux shell or terminal commands are very powerful and just a simple command could lead one to delete a folder, files or root folder,...
mkdir – make directories Usage: mkdir [OPTION] DIRECTORY… eg. mkdir lhn ls – list directory contents Usage: ls [OPTION]… [FILE]… eg. ls, ls l, ls lhn cd – changes directories Usage: cd [DIRECTORY] eg. cd lhn pwd - print name of current working directory Usage: pwd vim – Vi Improved, a programmers text editor Usage: vim [OPTION] [file]… eg. vim lhn.txt cp – copy files and directories Usage: cp [OPTION]… SOURCE DEST eg. cp sample.txt sample_copy.txt cp sample_copy.txt target_dir mv – move (rename) files Usage: mv [OPTION]… SOURCE DEST eg. mv source.txt target_dir...
A majority of Linux distributions are sold by companies, individuals and many non-commercial entities for free on the Internet. And now, it has...
/** * CVE-2014-4014 Linux Kernel Local Privilege Escalation PoC * * Vitaly Nikolenko * http://hashcrack.org * * Usage: ./poc [file_path] * *...
When it comes to hacking there is nothing like 100% security. Same has happened with the popular penetration testing and Security-related Linux...
There have been some interesting new developments since we published our report on Operation Windigo. In this blog post you will read...
Our report titled “Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign" details our analysis of a set...
In this blog post, we provide an in-depth analysis of Linux/Ebury - the most sophisticated Linux backdoor ever seen by our researchers....
Some 400 web servers found infected with Linux/Cdorked.A. including 50 in Alexa’s top 100,000 websites. And this backdoor has been applied to...
This comprehensive look at the problems of malware on Linux Apache web servers explains the threats to business and helps you figure...
We clarify that the Linux/Cdorked backdoor malware leaves no traces on the hard drive "other than its modified httpd binary" which can...
Analysis of a malicious backdoor serving Blackhole exploit pack found on Linux Apache webserver compromised by malware dubbed Linux/Cdorked.A, together with remediation...
Earlier I wrote about BackTrack renaming itself as Kali Linux or BackTrack 6 will be available for download soon, today is the day...