More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.
Using libpcap/Jpcap to capture and send packets on Solaris version (10/11)
1. Libpcap (http://www.tcpdump.org) Version 1.2
2. Jpcap(http://netresearch.ics.uci.edu/kfujii/Jpcap/doc/index.html) Version 0.6
1. GCC …
When experiencing some peculiar problem with the functioning of your PC, how many times has it happened that you look for a solution and even google can’t help?
It could be that you are one of the only few people on earth who ma…
Learn several ways to interact with files and get file information from the bash shell.
ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…