Category: General

5 Linux hacking distributions

5 Linux hacking distributions

1. Kali Linux

Kali Linux is the most widely recognized Linux distro for moral hacking and penetration testing. Kali Linux is developed with the aid of Offensive Security and previously with the aid of go into reverse.

Kali Linux is based on Debian. It comes with a massive quantity of penetration testing tools from diverse fields of protection and forensics. And now it follows the rolling release version, which means each device to your series will usually be up to date.

It’s the maximum advanced penetration testing platform accessible, helping a wide range of gadgets and hardware platforms. moreover, Kali Linux presents respectable documentation and has a massive and energetic network.

you can easily deploy Kali Linux in VirtualBox inside windows and begin training hacking right away.

2. BackBox

BackBox is a Ubuntu-primarily based distro developed for the functions of penetration testing and security assessment. It’s one of the fine distros in its discipline.

BackBox has its personal software repository that gives the present-day stable variations of diverse system & network evaluation toolkits as well as the maximum popular ethical hacking tools. It’s designed with minimalism in mind and makes use of the XFCE computer environment. It supplies a fast, effective, customizable, and whole enjoy. It also has a totally useful network behind it.

3. Parrot protection OS

Parrot Security OS is extraordinarily new to the game. Frozenbox network is at the back of the improvement of this distro. The target customers of Parrot safety OS are penetration testers who need a cloud-pleasant environment with online anonymity and an encrypted device.

Parrot safety OS is likewise based totally on Debian and makes use of MATE as its computing device environment. almost every identified tool for penetration trying out is to be had here, together with a few distinct custom equipment from Frozenbox network. And sure, it’s to be had as a rolling launch.
four.

4.BlackArch

BlackArch is a penetration checking out and protection research distro built on the pinnacle of Arch Linux.

BlackArch has its own repository containing hundreds of equipment organized in numerous groups. And the listing is growing over time.

In case you are already an Arch Linux person, you can install the BlackArch equipment series on the pinnacle of it.
five.

 

5. Bugtraq

Bugtraq is a Linux distro with a massive variety of penetration, forensic and laboratory equipment.

Bugtraq is available with the XFCE, GNOME, and KDE desktop environments, in Ubuntu, Debian, and OpenSUSE versions. It’s additionally to be had in 11 distinctive languages.

Bugtraq packs in a large arsenal of penetration testing equipment: mobile forensics, malware checking out laboratories, and equipment specifically designed by means of the Bugtraq community.

Facts You Need to Know About WordPress

Facts You Need to Know About WordPress:

1. WordPress is THE maximum famous content material control device within the international

more web sites are powered through WordPress than some other content material control gadget (CMS) inside the world (a CMS is a bit of software that helps you to without difficulty write, edit, and post content on the net). In reality, WordPress powers 4.5% of the whole internet(opens in a new tab).

somewhere among 50 and 60% of websites that use a CMS are constructed on WordPress. There are 17 blog posts published on WordPress sites each 2nd of each day.

2. There are a few virtually high Profile brands using WordPress

so many sites you’d apprehend use WordPress. CNN’s blogs are built on WordPress, as are Reuters’, The Wall avenue magazine, and Forbes. Mashable, the next web, and the brand new Yorker also are all constructed on WordPress.

other brilliant brands the use of WordPress encompass human beings mag, The Rolling Stones, style, MTV news, fb (for their Newsroom), Harvard enterprise assessment, and NASA, amongst lots of others(opens in a brand new tab).

If WordPress is strong enough for those websites, then it’s effective sufficient for almost any website online you want to build!

3. WordPress isn’t always just for running a blog

WordPress was given its begin as a blogging platform, but someplace alongside the way, builders realized you can accomplish that plenty more with it. Now, WordPress is at the back of the entirety from e-commerce websites to groups to online publications—like Skillcrush Blueprints!

whether or not you want to create a fundamental website for a local business or a big online shop promoting hundreds of products, it may be done with WordPress. And, of the route, it’s nevertheless exquisite for blogging!

4. Plugins permit you to upload a TON of capabilities to WordPress without Coding

WordPress helps you to make bigger what it can do thru using plugins. There are both free and paid plugins accessible that could do in reality something you might want to without the want to put in writing code from scratch.

right now, there are over 45,000 unfastened plugins inside the reputable WordPress listing. That doesn’t consist of all the premium plugins that may upload even greater capability for your websites.

Plus, in case you understand PHP (the language WordPress is constructed on) you can in addition personalize any plugin you need to do exactly what you want it to do. Or, construct your personal plugin from scratch.
five. WordPress talents are beneficial Even in case you Don’t Need to Be a Developer

builders aren’t the handiest tech execs obtainable who need WordPress capabilities. entrepreneurs can seriously advantage from understanding WP because it’s this kind of first-rate device for putting in place an internet business (such as growing online shops, touchdown pages, and greater). understanding the way to set up WordPress, customize a topic, and install plugins can prevent heaps of cash while you’re simply getting began.

marketers also can employ WordPress abilities. you can use it to create touchdown pages and for publishing blog posts. knowing the bits and bobs of how WordPress’s code works gives you the gain of not having to watch for your builders to make minor adjustments, or for a person else to set up a new page or internet site.

 

Most Interesting Facts About Linux Ubuntu Operating System

In this article, we are going to learn about the Most Interesting Facts About Linux Ubuntu Operating System

Most Interesting Facts About Linux Ubuntu Operating System :

  1. The chinese version of Ubuntu is used for going for walks the arena’s fastest supercomputer.
  2. For the majority of net servers, Ubuntu is the maximum used running structures.
  3. The stripped model of Ubuntu is utilized in Google’s Self-using vehicle.
  4. a few of the massive enterprises along with Uber and Lyft use Ubuntu.
  5. “Goobuntu.” is the custom Ubuntu of Google.
  6. Ubuntu follows a completely top notch and strict development schedule. Its new strong model is released in every six months, i.e in April and October.
  7. The symbol of Ubuntu is the authentic emblem, known as “Circle of pals”. It represents the reliability, freedom, precision, and collaboration.
  8. If we search for the net in Ubuntu, then it’s going to display all of the to be had net browsers.
  9. once French Police together convert the 80000 home windows pcs into the Ubuntu and saved 2 Million Euro.
  10. more than 1 Billion devices are presently running on Ubuntu.

Most Interesting Facts About Linux Operating System

In this article, we are going to learn about the Most Interesting Facts About Linux Operating System.

Most Interesting Facts About Linux Operating System:

  1. The first-ever Linux kernel just occupied only sixty-five KB.
  2. As of 2018, there are 20, 323, 379 traces of code within the Linux kernel.
  3. All the 500 quickest supercomputers run Linux.
  4. Linux runs on the whole lot, smartphones, servers, submarines, or space rockets.
  5. Huawei, Intel, Google, purple Hat, Facebook, Canonical, and Samsung are some of the top members of Linux kernel development in latest years.
  6. Linux is written over 95% of in c language, in line with information with the aid of the open hub.net website.
  7. whenever a kernel is launched, it is given a codename. current codenames have been “Fearless Coyote” (v4.13) and “merciless Moray” (v4.18).
  8. In Japan, bullet trains use Linux to preserve and control the advanced computerized train control system. The Linux platform is likewise used within the In-car-Infotainment generation (IVI) in Toyota and the other cars.
  9. We also can run our Ubuntu telephone in windowed mode with little tweaks.
  10. Linux has a specific vicinity in Hollywood. The visual outcomes of Avatar and substantial were developed on the Linux platform in 3D programs the use of the FOSS software.

Simple 3 steps to Remove Deceptive Site Ahead Google

Every individual managing their own website may have this feeling “How to Remove Deceptive Site Ahead for my website.

 

Deceptive Site Ahead

The deceptive site ahead warning simply means that attackers have compromised your site and most likely are using it for Phishing. This means the visiting users are being served fake pages that are tricking them to reveal their credentials, credit card info, and other crucial information. Which is then sent to the attackers on their shady servers.

Here are few tips that may help you to remove Deceptive Site Ahead:

Step1: Find the Cause of Infection

The first and most important step towards fixing the deceptive site ahead warning is to locate the infection. It could be present in a single page, file, folder, or the entire website.

Manual Search

While the manual search is not the ideal way for malware detection considering it requires expertise and prior knowledge to spot the malware, it can be a great start if you know your website in and out.

To start with,

  • Visit your website from another device by ignoring the warning.
  • Now, view the source of your site by right-clicking outside any element and selecting the View page source option. This will open the source code of your page in a new tab.
  • Here look for any suspicious third-party javascript files, iFrames, HTML tags, or other fishy-looking elements loading on that page. Note them down.
  • Now open the file manager of your server and view the source code of those files for malicious code.

During the manual search, some other resources that you need to check for fixing deceptive site ahead warning are:

  • Any new themes or plugins you recently installed.
  • Unknown web admins in the dashboard.
  • New admins or users in the database.
  • New files with unique names or base64 encoded characters.

To check for recently modified files, say 30 days old, log in to your server via SSH and run the following command:

find . -type f -mtime 30

Here, change the value from 30 to as per the number of days of your choice. A word of caution here, some files are automatically modified by the system so be sure to double verify for malware in such files before removing them.

Step 2: Clean the Website

Now that you have identified the infected files or hacked resources the next steps for fixing deceptive site ahead warning are:

  • Delete the malicious code in infected files. If you are unsure of what the code does, comment it out and get help from experts.
  • For code obfuscated using base64 encoding, use online resources to decode it and see what it does.
  • Remove suspicious users from the database as well as the dashboard and change passwords to each one of them to a secure and random string.
  • Delete any buggy or null plugins, themes, etc, and make sure to delete their files as well. There are plenty of alternatives available to them today that you can choose from if the plugin/theme adds important functionality to your website.
  • If any suspicious users are found in the property owner management page of your Google search console dashboard, remove them. Also, delete all meta tags and HTML files that were used to verify the ownership by unauthorized users.
  • Finally, alert the users to reset their credentials as phishing pages would have sent them to attackers.

Step 3: Submit Site for Review

The last step in fixing a deceptive site ahead warning message is to submit the website to Google for a review. However, before doing so, make sure you have double-checked your website for backdoors or malware.

If all is spick and span, submit the site for review using these steps:

  1. Login to your Google Search Console.
  2. Click and open the Security Issues report section and select I have fixed these issues.
  3. Thereafter, click on the Request a review. Here, tell in detail the steps you took in fixing the warning. You can also use custom templates provided by some sites.
  4. Finally, click Submit Request and in case there are multiple issues, repeat the process for each.
  5. When done with all, sit back and wait as this can take a few hours for Google to review your request.

If all is okay with your website, Google will lift the blacklisting and de-indexation of your pages. It can take a few days for your web pages to get re-indexed to regain their rankings entirely.

How Blog Is It Different From A Website

How Blog is it Different from a Website? If you are thinking about starting a blog or a website, then understanding these terms will help you meet your goals.

Blog:

A blog is a type of website where the content is presented in a way in which newer content appear first. Blog content are often referred to as entries or “blog posts”.

Blogs are typically run by an individual or a small group of people to present information . Blog posts also have a comments section where users can respond to the article.

How Blog is it Different from a Website :

Blogs are a type of website. The only real difference between a blog and other types of website is that blogs are regularly updated with new content displayed in a reversed chronological order (newer posts first).

Typical websites are static in nature where content is organized in pages, and they are not updated frequently. Whereas a blog is dynamic, and it is usually updated more frequently. Some bloggers publish multiple new articles a day.

Blogs can be a part of the larger website. Often businesses have a blog section where they regularly create content to inform and educate their customers.

Blogs have articles that are organized using categories and tags. On the other hand, websites use pages to organize and display content.

Blogs can be a website or part of a website. However, not all websites can be called blogs.

Hope this post helps you all to understand the difference about how both  blog and website differs from each other.

Benefits of adding Business Email Address in G Suite

A professional business email address has your company name instead of the generic gmail or yahoo account, for example: [email protected]

Most beginners use generic free business email accounts without a domain name which isn’t very professional. For example: [email protected] or [email protected].

Since anyone can create these generic email accounts, it becomes harder for customers and other businesses to trust such email addresses as legitimate business email accounts.

Below are the top 4 reasons why you need a professional email address for your business:

  • A custom business email address looks more professional.
  • It is also short and easy to remember.
  • A professional business email address helps you earn customer’s trust as a legitimate business.
  • Sending emails with your own business name allows you to promote your brand with each email you send.

The best part is that you can get your own custom business email address for free, which means there is no excuse for not getting it.

If you want your customers and other businesses to take you seriously, then you need to start using a professional business email address, immediately.

You will need to have domain name and a website to create a free business email address.

After that, you will need an email service provider to handle your business emails.

Google offers professional business email address with G Suite which includes Gmail, Docs, Drive, and Calendar for businesses.

This method is not free, but it allows you to use Gmail for your professional business email with your own business name.

While there’s a small cost, it comes with many advantages:

You will be using Gmail’s familiar interface and apps to send and receive emails.

Google has far superior technology which ensures that your emails are delivered right away, and they don’t end up in spam folders.

Your website hosting company has shared server resources. This means they don’t want you to send too many emails. Gmail on the other hand will allow you to send up to 2000 emails per day.

That’s all, we hope this article helped you learn about Importance of Business Email Address in G Suite

Advantages in creating Email list | mumbai webhosting

What is an Email List?

An email list is a special list of names and email addresses of people who gave you permission to send them updates and promotions from your business.

You can build your email list inside a marketing software and send bulk email notifications to everyone regarding your blog updates, online store, or other business services.

According to the Direct Marketing Association, email marketing on average sees a 4300 percent return on investment (ROI) for businesses in the USA.

Because email subscribers joined your email list from your website and verified their identity by clicking on a link (double-optin), they are extremely interested in what you have to offer. This is why they are more likely to convert into paying customers.

In our business, email list gets 10 times higher conversions than social media campaigns.

This makes sense if you think about the reasons that make email an incredibly powerful communication channel:

1. Email is Personal

Email allows you to land into a user’s inbox. There is no ranking system limiting your reach. It is very direct and personal.

2. Email is Purposeful

To get updates from you, a user fills out a form to signup for your email list and confirm their email address. Someone doing this much work is obviously interested in hearing from you, and they are much more receptive to your message.

3. Email is Targeted

As we mentioned earlier, the user has already shown interest in your product or content. Since you already know what they like, you can deliver them highly relevant offers to get better results. This is called segmentation, and we will cover that later in the article.

4. You Own Your Email List

You do not own Facebook, Twitter, or Google. Your social media campaigns and SEO efforts can go to waste when these platforms change their policies. On the other hand, you own your email list, and it is not influenced by decisions of other businesses.

5. Email is One-on-One

People read email in the privacy of their inbox. The message is not on a public timeline or newsfeed. They can ask you questions directly in private with confidence. This helps build trust and connection.

6. More People Use Email Several Times a Day

You may have heard that Facebook has 1.4 billion and Twitter has 100 million daily active users. What you have may not have heard, is the number of people using Email every day.

Every internet user has at least one email account. A recent research conducted by Radicati found out that there 3.8 billion active email accounts. That’s half the population of Earth.

This is precisely why every smart business in the world has an email list.

Big name brands learned this lesson a long time ago, and that’s why they spend thousands of dollars on social media campaigns to get people to sign up for their email lists.

They understand that email marketing is the best long-term investment with a much higher return because people will continue to get their message at a very low cost for a longer period of time.

create and manage mailing lists

Mailing lists allow us to send emails to multiple recipients . This feature is very useful when you need to send a newsletter or another update to a group of people.  Now let us know the steps to create and manage mailing lists .

1. Log into your cPanel, navigate to the Mail section and click on Mailing Lists:

  • Enter the mailing list name in the List Name text box
  • Select a domain from the Domain menu
  • Enter a strong password for your mailing list 
  • Select one of the following access types: 
    Public: subscriptions are open
    Private:
     the administrator must approve subscriptions

2. Click on Add Mailing List:

Once done, you will see a message about the successful mailing list creation. 

Managing mailing lists 

All the mailing lists you’ve created can be found in the Current Lists section:

  • List Name: name of your Mailing List
  • Usage: amount of the disk space that the mailing list uses
  • Access: private or public
  • Administrator: mailing list administrators
  • Functions: administrative functions for the mailing list:

Delete: the mailing list will be removed
Change Password: allows changing the mailing list password without having to fill in the old one
Manage: redirects to the mailing list management dashboard

Delegation assigns administrative rights to available users. Use arrows to add/exclude selected users from the list of administrators and click Save

Mass Removal option removes users from your mailing list 

Privacy options

  • Subscription rules: this section allows you to configure subscription and membership exposure policy
  • Sender filters: this section contains the controls for moderation of both member and non-member postings
  • Recipient filters: this section allows you to configure various filters based on the recipient of the message
  • Spam filters: this section allows you to configure various anti-spam filters posting filters, which can help reduce the amount of spam your list members end up receiving

Hope this article will help you all to know about creating and managing mailing list.

Advantages of MongoDB over RDBMS

  • Schema less − MongoDB is a document database in which one collection holds different documents. Number of fields, content and size of the document can differ from one document to another.
  • Structure of a single object is clear.
  • No complex joins.
  • Deep query-ability. MongoDB supports dynamic queries on documents using a document-based query language that’s nearly as powerful as SQL.
  • Tuning.
  • Ease of scale-out − MongoDB is easy to scale.
  • Conversion/mapping of application objects to database objects not needed.
  • Uses internal memory for storing the (windowed) working set, enabling faster access of data.

Why Use MongoDB?

  • Document Oriented Storage − Data is stored in the form of JSON style documents.
  • Index on any attribute
  • Replication and high availability
  • Auto-sharding
  • Rich queries
  • Fast in-place updates
  • Professional support by MongoDB

Where to Use MongoDB?

  • Big Data
  • Content Management and Delivery
  • Mobile and Social Infrastructure
  • User Data Management
  • Data Hub

Windows Vs. Linux: HOME Directory

For every user in Linux, a directory is created as /home/

Consider, a regular user account “Tom”. He can store his personal files and directories in the directory “/home/tom”. He can’t save files outside his user directory and does not have access to directories of other users. For instance, he cannot access directory “/home/jerry” of another user account”Jerry”.

The concept is similar to C:\Documents and Settings in Windows.

When you boot the Linux operating system, your user directory (from the above example /home/tom) is the default working directory. Hence the directory “/home/tom is also called the Home directory which is a misnomer.

The working directory can be changed using some commands which we will learn later.

Windows Vs. Linux: Users

There are 3 types of users in Linux.

  1. Regular
  2. Administrative(root)
  3. Service

Regular User

A regular user account is created for you when you install Ubuntu on your system. All your files and folders are stored in /home/ which is your home directory. As a regular user, you do not have access to directories of other users.

Root User

Other than your regular account another user account called root is created at the time of installation. The root account is a superuser who can access restricted files, install software and has administrative privileges. Whenever you want to install software, make changes to system files or perform any administrative task on Linux; you need to log in as a root user. Otherwise, for general tasks like playing music and browsing the internet, you can use your regular account.

Service user

Linux is widely used as a Server Operating System. Services such as Apache, Squid, email, etc. have their own individual service accounts.  Having service accounts increases the security of your computer. Linux can allow or deny access to various resources depending on the service.

Note:

  1. You will not see service accounts in Ubuntu Desktop version.
  2. Regular accounts are called standard accounts in Ubuntu Desktop

In Windows, there are 4 types of user account types.

  1. Administrator
  2. Standard
  3. Child
  4. Guest

Windows Vs. Linux File System

In Microsoft Windows, files are stored in folders on different data drives like C: D: E:

But, in Linux, files are ordered in a tree structure starting with the root directory.

This root directory can be considered as the start of the file system, and it further branches out various other subdirectories. The root is denoted with a forward slash ‘/’.

Types of Files

In Linux and UNIX, everything is a file. Directories are files, files are files, and devices like Printer, mouse, keyboard etc.are files.

Let’s look into the File types in more detail.

General Files

General Files also called as Ordinary files. They can contain image, video, program or simply text. They can be in ASCII or a Binary format. These are the most commonly used files by Linux Users.

Directory Files

These files are a warehouse for other file types. You can have a directory file within a directory (sub-directory).You can take them as ‘Folders’ found in Windows operating system.

Device Files:

In MS Windows, devices like Printers, CD-ROM, and hard drives are represented as drive letters like G: H:. In Linux, there are represented as files.For example, if the first SATA hard drive had three primary partitions, they would be named and numbered as /dev/sda1, /dev/sda2 and /dev/sda3.

Note: All device files reside in the directory /dev/

All the above file types (including devices) have permissions, which allow a user to read, edit or execute (run) them. This is a powerful Linux/Unix feature. Access restrictions can be applied for different kinds of users, by changing permissions.

Benefits HTTP to HTTPS

HTTPS or Secure HTTP is an encryption method that secures the connection between users’ browser and your server. This makes it harder for hackers to eavesdrop on the connection.

Every day we share our personal information with different websites whether it’s making a purchase or simply logging in.

In order to protect the data transfer, a secure connection needs to be created.

That’s when SSL and HTTPS come in.

Each site is issued a unique SSL certificate for identification purposes. If a server is pretending to be on HTTPS, and its certificate doesn’t match, then most modern browsers will warn the user from connecting to the website.

Now you are probably wondering, why do I need to move my WordPress site from HTTP to HTTPS specially if it’s a simple blog or small business websitethat doesn’t collect any payments.

Why do you need HTTPS and SSL?

Last year Google announced a plan to improve overall web security by encouraging website owners to make the switch from HTTP to HTTPS. As part of this plan, their popular Chrome web browser would mark all websites without a SSL certificate as “Not Secure” starting July 2018.

As part of the announcement, Google also said that websites with SSL will also see SEO benefits and higher rankings. Since last year, a large number of websites have switched from HTTP to HTTPS.

Google has been slowly rolling out the “Not Secure” warning in Chrome. For example, if someone visits a HTTP website using the incognito window, it will be marked as Not Secure. If someone visits a HTTP website on regular mode and tries to fill out a contact form or another form, then the website will be marked as insecure.

When your readers and customers see this notice, it gives them a bad impression for your business.

This is why all websites need to move form HTTP to HTTPS and install SSL immediately.