Abhay Porwalabhayporwals.hashnode.dev·Mar 9, 2024Linux DecodedOnce a person said, "Linux is not about choice, it's about freedom". Welcome to the world of Linux, where freedom meets functionality, and tech enthusiasts find their digital playground. If you're wondering why Linux is more than just an operating sy...Discusslinux for beginners
SHREE RAM BABUethical-hacking.hashnode.dev·Mar 4, 2024Linux Operating SystemWhat is Linux? Linux is a powerful and flexible family of operating systems that are free to use and share. It was created by a person named Linus Torvalds in 1991. What’s cool is that anyone can see how the system works because its source code is op...Discuss#skilldarpan #sevendayhacking
SHREE RAM BABUethical-hacking.hashnode.dev·Mar 4, 2024Client Server ArchitectureWhat is Client Server Architecture? The client-server architecture refers to a system that hosts, delivers, and manages most of the resources and services that the client requests. In this model, all requests and services are delivered over a network...Discuss#skilldarpan #sevendayhacking
SHREE RAM BABUethical-hacking.hashnode.dev·Mar 4, 2024Ipconfig CommandWhat is IPCONFIG COMMAND? IPCONFIG is a System Service Tools (SST) Advanced Analysis command that allows viewing or altering IP configuration settings not available through the standard TCP/IP configuration menus. What are the Benefits of IPconfig? ...Discuss#ethi
SHREE RAM BABUethical-hacking.hashnode.dev·Mar 4, 2024Traceroute CommandWhat is Traceroute Command ? A traceroute provides a map of how data on the internet travels from its source to its destination. When you connect with a website, the data you get must travel across multiple devices and networks along the way, particu...Discuss#skilldarpan #sevendayhacking
SHREE RAM BABUethical-hacking.hashnode.dev·Mar 1, 2024What is Ethical Hacking and Types of Hackers?What is ethical hacking ? Ethical hacking is an authorized attempt to access a computer system or an application and obtain data in an unauthorized way. Ethical hackers use the same techniques and strategies to access confidential information as othe...Discuss·111 reads#skilldarpan #sevendayhacking
Kendgrrkend.com·Feb 24, 2024Community Building for Hackers: Cultivating Collaboration and InnovationIn the dynamic and ever-evolving tech landscape, the role of community cannot be overstated. For hackers, developers, and tech enthusiasts, building a vibrant community is not just about networking; it’s about creating a space where collaboration, in...Discusscommunity building
Isiaq Olakunlehardthings.hashnode.dev·Jan 20, 2024What happens when you type google.com in your browser and press EnterYou see a google landing page right❓️❓️ Actually, their are a lot of magics happening under the hood😇. Grab your cup of ☕️ and let me drive you in🚘 I want to believe you already know that Google is hosted on a server which has an IP address. I know...Discuss·1 like·33 readsweb infrastructure
Rutheless Techpranavpythondev.hashnode.dev·Jan 20, 2024Only hackers can type this (tutorial)Follow along Windows key + v go to punctuations where tiangle and figures are there go to general punctuation and select this- § done https://youtu.be/gqZ77bBkLko?si=EzEYdRbv_Bj1DXf7Discuss#simpletech
AfriMonin4fr1m0n1n.hashnode.dev·Jan 4, 2024Part 1: Satellite Hacking with a CyberwarriorWelcome back Hackers! In this series, you will delve into the intricacies of satellite functionality and discover effective methods for leveraging their capabilities. Part 1 marks the beginning of this comprehensive series, which will unfold across m...Discuss·27 readsAerospace Hackingsate