If you are like me you used two factory authentication everywhere that you can. This is a nice tutorial on how to added it to your ssh authentication.
https://www.howtoforge.com/tutorial/secure-ssh-with-google-authenticator-on-centos-7/
If you are like me you used two factory authentication everywhere that you can. This is a nice tutorial on how to added it to your ssh authentication.
https://www.howtoforge.com/tutorial/secure-ssh-with-google-authenticator-on-centos-7/
This is a good list of software to practice Hacking with
https://www.dionach.com/blog/review-of-purposefully-vulnerable-applications-to-practice-hacking
I hate it when I try to save a file only to find I didn’t edit it as root. This is how you can save it anyway.
http://www.cyberciti.biz/faq/vim-vi-text-editor-save-file-without-root-permission/
When you go to a site that shows a password field, have you ever wondered what was behind those stars? Instead of viewing source and finding that spot in the code you can easily run this piece of javascript in the url bar of Chrome and Firefox
javascript: var oInputs = new Array();oInputs = document.getElementsByTagName( ‘input’ );for ( i = 0; i < oInputs.length; i++ ){ if ( oInputs[i].type == ‘password’ ) { oInputs[i].type =’text’; }}alert(‘done’);
Just make sure the javascript word is there (chrome seems to automatically remove it). When you run this it will change the password fields to clear text and then notify you that it finished.
http://www.cyberciti.biz/faq/cve-2015-3456-patch-venom-on-debian-ubuntu-fedora-centos-rhel-linux/