root
38 views | +0 today
Follow
root
IT Systems
Curated by Koray AGAYA
Your new post is loading...
Your new post is loading...
Rescooped by Koray AGAYA from Hacking, Reverse Engineering, Software, Scripts, Coding, Guides
Scoop.it!

4 Nmap Scripts for Hunting 2012 popular vulnerabilities

4 Nmap Scripts for Hunting 2012 popular vulnerabilities | root | Scoop.it
Here we have four important Nmap Scripts for Hunting 2012 popular vulnerabilities including MS12-020 RDP vulnerability,Php-cgi vulnerability, Samba heap overflow vulnerability and Bypassing authentication in MySQL and MariaDB servers...

Via alexander knorr, ITGabs
more...
ITGabs's curator insight, February 18, 2013 9:39 AM

Awesome Nmap Scripts ;)

Rescooped by Koray AGAYA from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
Scoop.it!

Establishing your SSH Server's Key Fingerprint

Establishing your SSH Server's Key Fingerprint | root | Scoop.it
When you connect to a remote host via SSH that you haven't established a trust relationship with before, you're going to be told that the authenticity of the host your attempting to connect to can'...

Via Frederic GOUTH
more...
No comment yet.
Scooped by Koray AGAYA
Scoop.it!

How to Set Up RAID on Your PC | PCWorld

How to Set Up RAID on Your PC | PCWorld | root | Scoop.it
Boost your hard-drive performance, add redundancy, or do both by converting your PC to use a RAID setup.
more...
No comment yet.
Scooped by Koray AGAYA
Scoop.it!

How to configure RAID in Linux - Tutorial

How to configure RAID in Linux - Tutorial | root | Scoop.it
Extensive, step-by-step tutorial on how to configure Redundant Array of Inexpensive Disks (RAID) in Linux, including striping and mirroring, and how to install Linux on RAID devices, including the GRUB bootloader setup...
more...
No comment yet.