CHAPTER 2. Reconnaissance: Information Gathering for the Ethical Hacker

In this chapter you will • Define active and passive footprinting• Identify methods and procedures in information gathering• Understand the use of social networking, search engines, and Google hacking in information gathering• Understand the use of whois, ARIN, and nslookup in information gathering• Describe the DNS record types Footprinting Gathering information about your intended target … Continue reading CHAPTER 2. Reconnaissance: Information Gathering for the Ethical Hacker

Chapter 1. Introduction to algorithms / 1

In this chapter• You get a foundation for the rest of the book.• You write your first search algorithm (binary search).• You learn how to talk about the running time of an algorithm (Big O notation).• You’re introduced to a common technique for designing algorithms (recursion). Introduction An algorithm is a set of instructions for … Continue reading Chapter 1. Introduction to algorithms / 1

Exercise 3 – Change Runlevels and Shutdown or Reboot System

A run level on a Linux system is the definition of what all services are running on the system. To run each service, relevant parameters need to be initialised in the init file. Therefore, each level defines the state of various parameters in the init file. Each run levels is referred to by a number. … Continue reading Exercise 3 – Change Runlevels and Shutdown or Reboot System

Chapter 1 Introduction to Computers, the Internet and the Web – 2

1.10 Test-Driving a C Application in Windows, Linux and Mac OS X In this section, you’ll run and interact with your first C application. You’ll begin by running a guess-the-number game, which randomly picks a number from 1 to 1000 and prompts you to guess it. If your guess is correct, the game ends. If … Continue reading Chapter 1 Introduction to Computers, the Internet and the Web – 2

Introduction to Computers, the Internet and the Web

1.3 Data Hierarchy Data items processed by computers form a data hierarchy that becomes larger and more complex in structure as we progress from the simplest data items (called “bits”) to richer ones, such as characters and fields. Figure 1.2 illustrates a portion of the data hierarchy. Bits The smallest data item in a computer … Continue reading Introduction to Computers, the Internet and the Web

Linux Centos/Ubuntu List services that start on startup

In this article we will introduce some command that we can be use on showing startup program on the linux Operating system. ie: Ubuntu/Centos COMMAND 1: This command are be able working on Ubuntu. This is a shell command to list the contents of /etc/init just simply type initctl list and you will get some process … Continue reading Linux Centos/Ubuntu List services that start on startup

Exercise 2 – Manage SystemBoot

Booting a system refers to initialisation various parameters of the system or any hardware device. The booting process loads various files and libraries from the operating system. In this exercise, you will understand the files used in the system bootup process and boot events. Please refer to your course material or use your favourite search … Continue reading Exercise 2 – Manage SystemBoot

Exercise 1 – Determine and Configure Hardware Settings

In this exercise, you will determine and configure hardware settings in a Linux system. Please note that some of the legacy devices may not automatically be detected by the operating system and therefore, you will need to manually configure them in the system BIOS. Please refer to your course material or use your favourite search … Continue reading Exercise 1 – Determine and Configure Hardware Settings