COVID-19 IS REAL PLEASE STAY AT HOME, FOR ADVERT PLACEMENT OR INQUIRY PLEASE CALL: 08166201592 OR 09031936614 THANKS Basic Turmux Commands Skip to main content

Basic Turmux Commands

Turmux is an android terminal emulator that enables command line interface, just like command prompt , it works directly with no rooting or setup required

Basic Command Codes and Their Functions

Popular posts from this blog

Step by Step of Becoming an Ethical Hacker

INTRODUCTION : What is Hacking? Hacking of computerized electronic machines and networks is considered as the biggest national threat by the security services and the intelligence agencies of many countries. Hacking was once considered as a harmless activity to improve  an existing computerized machine by identifying its strength and weakness. But now hacking is more or less of a crime than any other. In some countries hacking is considered on the same level as terrorism. It is condemned large by the world governments. Types of Hacking 1. White Hat Hacking ( Ethical Hacking) 2. Black Hat Hacking ( Crackers) Ethical hacking : An Ethical hacking  is a process  of building , fortifying, securing a computerized machine and networks by knowing its strength and weakness .  To do that, the ethical hacker must get into the mindset of whoever is trying to break into their system.  They will thoroughly check their system for weaknesses, and figure out how they...

Penetration Testing

Penetration test, which  is also known as pentest, is an authorized simulated cyberattack on a computer system, which is aimed at evaluating the security of the system. The test is performed to identify both weaknesses (also referred to as vulnerabilities), including the potential for unauthorized parties to gain access to the system's features and data, as well as strengths,enabling a full risk assessment to be completed. Types of Web Penetration Testing Web applications can be penetration tested in 2 ways. Tests can be designed to simulate an inside or an outside attack. 1) Internal Penetration Testing – As the name suggests, the internal pen testing is done within the organization over the LAN, hence it includes testing web applications hosted on the intranet. This helps in finding out if there could be vulnerabilities which exist within the corporate firewall. We always believe attacks can happen only externally and many a time’s internal Pentest is overloo...