Introduction to Unix
Directory When you want to prepare Web pages that are going to be accessible by anyone in the world, you need to put these pages in a directory called public_html. Hence you need to create this directory in your home directory. As this work needs to be accessible by anyone, this directory will have to be in
NVIDIA Edge Program Highlights – Celebrating 6 Months | Unreal Engine
https://www.youtube.com/watch?v=Y-Ub4bRX-dc&feature=youtu.be The NVIDIA Edge Program provides high-end hardware to teams and individuals creating fantastic content with Unreal Engine. Epic awards each winning project an NVIDIA GTX 1080 Ti. Visit http://unrealengine.com/nvidiaedge for more information
The Four Emerging AI Trends to Watch in 2018
Thanks to the driving momentum of modern tech innovators seeking to carve a new path forward enhanced by adaptive algorithms, the capabilities of Artificial Intelligence have grown exponentially in recent decades. Much of what once seemed implausible in the realm of AI is now a reality, and the still-emerging use cases for this
The P Versus NP Problem Is One of Computer Science’s Biggest Unsolved Problems
In the world of theoretical computer science, P vs. NP is something of a mythical unicorn. It's become notorious, since it remains an unsolved problem. It basically asks this: If it is easy to check that a solution to a problem is correct, is it also easy to solve that problem? Get back
WannaCry a Birthday Gift??
I woke up on the 12th of May, it was my birthday, and I looked on the news feed and saw a burst of articles regarding the WannaCry Ransomware that has swept across the globe. In the last few days, a new type of malware called Wannacrypt has done worldwide damage. It combines the
How to prepare for PWK/OSCP, a noob-friendly guide
Few months ago, I didn't know what Bash was, only heard of SSH tunneling, no practical knowledge. I also didn't like paying for the PWK lab time without using it, so I went through a number of resources till I felt ready for starting the course. Warning: Don't expect to be spoon-fed if you're
Shadow Brokers Release Attack Tool Archives
On April 9 and April 14, 2017, the Shadow Brokers threat group released archives of attack tools and other information that it claims originated from the National Security Agency (NSA). The contents included exploits against Windows, Solaris, and other software from as early as 2008, as well as information about a campaign targeting
How to Sniff a Network: Decoding the IP Layer
Network sniffers allow you to see packets entering and exiting a target machine. As a result, they have many practical uses before and after exploitation. In some cases, you’ll be able to use Wireshark (https://wireshark.org/) to monitor traffic or use a Pythonic solution like Scapy (which we’ll explore in the later
How to Sniff a Network: Packet Sniffing on Windows and Linux
Network sniffers allow you to see packets entering and exiting a target machine. As a result, they have many practical uses before and after exploitation. In some cases, you’ll be able to use Wireshark (https://wireshark.org/) to monitor traffic or use a Pythonic solution like Scapy (which we’ll explore in the later
How to Sniff a Network : Raw Sockets and Sniffing
Network sniffers allow you to see packets entering and exiting a target machine. As a result, they have many practical uses before and after exploitation. In some cases, you’ll be able to use Wireshark (https://wireshark.org/) to monitor traffic or use a Pythonic solution like Scapy (which we’ll explore in the later posts). Nevertheless,