Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers. It connects, via a secure channel over an insecure network, a server and a client running SSH server and SSH client programs, respectively. …
Read More »How to use sar for monitoring your Linux system? sysstat sar examples and usage
This article describes how to install and use sar (sysstat) a system performance tools for Linux. It comes with plenty of sar examples and usage. Sar is part of the sysstat package. According to the package description it includes the following system performance tools: sar: collects and reports system activity …
Read More »Recommended books for Pentesters – A collection of books for Linux security administrators and pentesters
So you want to be pentester? A common question is where do you start? This post gives you a list of recommended books for Pentesters. It is useful for any Linux security administrators and aspiring pentesters or anyone who is interested to learn the basic workings of Penetration test with …
Read More »Linus Torvalds quotes
Linus Torvalds was born in Helsinki, Finland. He is the son of journalists Anna and Nils Torvalds, and the grandson of poet Ole Torvalds. Both of his parents were campus radicals at the University of Helsinki in the 1960s. His family belongs to the Swedish-speaking minority (5.5% of Finland’s population). …
Read More »Notable Penetration Test Linux distributions of 2014
A penetration test, or the short form pentest, is an attack on a computer system with the intention of finding security weaknesses, potentially gaining access to it, its functionality and data. A Penetration Testing Linux is a special built Linux distro that can be used for analyzing and evaluating security …
Read More »