What is penetration testing? Explain different stages of penetration testing?

Today in this article you will learn about penetration testing, its types, some examples of penetration testing tools, and the different stages of penetration testing. What is penetration testing? Penetration testing (also known as pen testing or ethical hacking) is a simulated cyber attack by a security expert with the intention to find and exploit … Read more

What is rootkit? How to detect and remove it?

Today in this article we are going to discuss what is a rootkit, its types, and the different tools used to remove rootkits from a system. Introduction A rootkit is a set of malicious computer programs that are designed to enable access to a remote computer system while hiding its presence. Having rootkits on a … Read more

What is Malware? What are different types of Malware?

Today in this article, we are going to discuss what is malware, its different types, the symptoms that a system is infected with malware, and how to prevent a system from malware infection. Introduction Malware (OR malicious software) is a computer program that is intentionally designed to disrupt a computer system or network. It can … Read more

How To Use Nmap For Scanning A Port?

There are lots of network mapping and security auditing tools available for reviewing and analyzing a computer network for possible security vulnerabilities and loopholes. These tools can be used by a network or a computer security professional to evaluate the possible threats in their system. Nmap is from one of these tools, we are … Read more

How to install Chkrootkit on Ubuntu Linux?

DotOS Oreo for Redmi 3s/Prime

Chkrootkit (or check rootkit) is a free and open-source tool lightweight antivirus program that is used especially to detect and remove rootkits from a Linux system. You can use chkrootkit in the command line or GUI. It is similar to rkhunter which is another rootkit detection and removal tool. In this article, I will discuss … Read more

How To Check Open Ports In Linux Using Terminal?

In the context of computer networks, a port can refer to either a physical or a virtual connection point. A physical port allows a cable to connect with the computers, routers, modems, or any other peripheral devices. Virtual ports are part of T/IP networking. Most of the software applications use these ports to connect and … Read more

How To Disable Secure Boot in A System?

Secure boot is a feature of UEFI which ensures that your PC boots only through the firmware that is trusted by the manufacturer. If needed, you can disable the secure boot option through the UEFI menu, but the actual way of disabling this depends on the PC manufacturer. Before getting into the exact steps, let’s … Read more

How to install and use rkhunter on Ubuntu Linux?

Rootkit is a set of malicious computer programs that are designed to enable access to a computer system while hiding its presence. Having rootkits on a system mean someone have unauthorized access to it and most probably they are accessing data and sensitive information of your system. There are software using which you can detect … Read more