7 min readLINUX FOR HACKERSLinux for Hackers, Part 8: Managing the User EnvironmentManaging the User Environment Among the areas that Linux newcomers find problematic, managing the user environment variables might be the...
5 min readLINUX FOR HACKERSLinux for Hackers, Part 9: Text ManipulationAs I have mentioned several times in my previous Linux tutorials, nearly everything in Linux is a file, and very often they are text...
7 min readLINUX FOR HACKERSLinux for Hackers, Part 7: BASH Scripting BasicsThis series, Linux for Hackers, was developed to help familiarize the uninitiated into the world of using Linux for hacking. If you have...
5 min readLINUX FOR HACKERSLinux for Hackers, Part 6: Managing File PermissionsI've been writing these Linux tutorials in an attempt to fill the void in the education of some aspiring hackers into the Linux operating...
4 min readLINUX FOR HACKERSLinux for Hackers, Part 5: Adding and Removing SoftwareOne of the most fundamental tasks in Linux or--for that matter--any operating system, is adding and removing software. We often need to...
6 min readNETWORK HACKINGLinux Basics for the Aspiring Hacker, Part 4 (Networking)From working with thousands of aspiring hackers, I have found that very often the greatest hurdle to getting started in hacking is...
4 min readLINUX FOR HACKERSLinux Basics for the Aspiring Hacker, Part 2 (Finding stuff)In many cases, the greatest hurdle to becoming a white hat hacker is proficiency with the command line (cli) Linux. This series is...