Using NMAP can help identify vulnerable points on your network. One of the more effective tools out there, and as usual, the best are the command line. – AG
Even just a small amount of coding, or having reference materials, can go a long way when troubleshooting. Reverse engineering code also has it’s merits and these beginner bash tutorials and reference materials compiled by nixCraft are one to bookmark.
A list of online tutorials and resources to help you learn bash shell, the default OS X and Linux shell.
Most technology begins with concepts or utilization in the military and eventually is adapted to civilian use. The process works both way though, and a new scope utilizing an ARM processor and Linux back-end allows targeting at 1000-yards and a third party visual monitoring interface. This is not only cool, but also very unique by allowing target confirmation when profiling high asset targets. Also it’s application in law enforcement will allow a mobile command to watch in real-time as a sniper takes a threatening target, which may be holding a hostage, and makes a computer aided decision on factors snipers have to judge to reduce any casualties. Wind, distance, moisture, etc all take into account when putting a round downrange. This process is now aided by a Linux based operating system and a low cost ARM processor and fits into a body of a scope. Read the whole story here.
I was looking for a development server to test builds on and ran across a few pre-made virtual distros that I thought would help. Unfortunately I was not sure of what was installed in some, and most I ran across were Ubuntu, an OS I am not too keen about.
I did a bit of digging and found a base distro for CentOS 6, with a minimal amount of addons. Continue reading