Root Install

  • Home
  • About
  • Contact Us
  • Tutorials
    • linux
    • system administration
    • ethical hacking
    • python
    • database
    • hacking-tools

Tag: linux

How to Get Image Metadata in Linux

Posted on October, 2021November, 2021 by Vladimir Petre

Metadata is basically data about data. Think about it as information that describes a file and provides a deeper understanding of the data you are looking at.

It can be used to index multiple files in a database collection or … Read more

Tagged linux, metadata, ubuntu

How to Get Weather Data in Linux

Posted on October, 2021November, 2021 by Vladimir Petre

If you are traveling somewhere and want to find out how the weather will be but can’t get your head out of your Linux terminal, if you want to know the forecast for your location, the current temperature, or just … Read more

Tagged curl, linux, ubuntu

How to Convert PDF Files to Images in Linux

Posted on October, 2021December, 2021 by Vladimir Petre

Using this short and easy tutorial you will learn how to convert entire PDF documents, or just certain pages, to various image formats and resolutions.

1. Install tool

To convert PDFs to images, I will use a tool called … Read more

Tagged linux, pdf, system administration

How to Setup a Reverse Shell in Linux

Posted on May, 2021February, 2022 by Rimsha Ashraf

In this tutorial, you will learn the basics of reverse shells and how to setup one on your Linux machine, and then we’ll discuss ways to prevent it.

This guide requires you to understand the basic networking client-server model where … Read more

Tagged ethical hacking, linux

How to Dockerize Django with PostgreSQL

Posted on May, 2021May, 2021 by Abdou Rockikz

Django is a popular high-level open-source Python web framework. It is well known for rapid development and unit testing included in the framework.

Django works well for most web applications and comes with essential tools to solve common issues such … Read more

Tagged devops, docker, linux, ubuntu

How to Scan Sites for XSS Vulnerability

Posted on April, 2021February, 2022 by Rimsha Ashraf

With the advancement in technology and the current pandemic situation, the world has shifted to remote work on a large scale. Cybercriminals have become more active and come with more sophisticated ways to attack. The security risk at many organizations … Read more

Tagged ethical hacking, linux

Port Scanning with Nmap

Posted on February, 2021February, 2021 by Abdou Rockikz

Port scanning is the act of scanning a network or hosts in order to determine which network ports are open and thus which service they provide.

While the web (also known as the World Wide Web) is the most used … Read more

Tagged ethical hacking, linux

Hashing Algorithms and Checksums in Linux

Posted on February, 2021February, 2022 by Rimsha Ashraf

Say you want to send an important file, how do you ensure that the receiver will get the exact file without any changes ?

Well, the most common approach is use hashing, which translates the file information into fixed sized … Read more

Tagged ethical hacking, linux, system administration

How to Perform ARP Spoof in Linux using Arspoof and Arping

Posted on February, 2021November, 2021 by Abdou Rockikz

What is ARP

Address resolution protocol (ARP) is one the simplest network protocols. It simply maps IP to physical addresses. When used with Ethernet, IP are mapped to MAC addresses.

Though simple, it is very important for interconnection hosts in … Read more

Tagged ethical hacking, linux, networking, ubuntu

Regular Expressions using Sed and Grep

Posted on February, 2021February, 2021 by Abdou Rockikz

A regular expression is a sequence of characters defining a search pattern. It is one of the most powerful tools when it comes to mass text data filtering and modification.

Regular expressions often scares the newcomers but even with a … Read more

Tagged linux, system administration

Posts navigation

← Older posts
Newer posts →

Tags

c++ ci/cd cloud computing cracking curl database devops docker ethical-hacking ethical hacking FFmpeg forensics hacking-tools javascript linux metadata networking pdf python scapy steganography system administration ubuntu windows

Recent Posts

  • 7 Best Tools To Test MITM (Man In The Middle) Attacks
  • Top 8 Tools To Protect Against Botnet Attacks
  • Linux Malware on the Rise: Tops Attacks to Look for and How to Protect Against Them
  • Top 5 Malware Scanners for Linux
  • Exposing Ransomware in Linux-based Multi-cloud Environments

Copyright © Root Install 2023

  • Privacy Policy
  • Contact Us
  • About