In this video we will discuss Game Hacking because I recently participated in Cyberspace CTF 2024 and I came across this challenge which involves Game Hacking using “Snake” on Linux.
Hey folks! this video will guide on how to protect your identity by being invisible online. I have used kali linux combined with TOR that uses ProxyChains to achieve that anonymity.
Linux is a family of open-source operating systems based on the Linux kernel, which is a program that manages how the computer interacts with its hardware and resources. Linux can be used in various devices, such as computers, smartphones, and …
In this video, I will be showing you how hackers are able to login into CCTV Security Camera Systems without the owners even noticing. Resources: Nmap Shodan search engine. Port 554 RTSP.
Hello everybody, In this video, we are gonna cover the following topics: > What is Cyber Security? > CIA Triad > Types of Hackers > Some Job Profiles in Cyber security > Installation of Oracle VirtualBox > Installation of Kali …
Hello everyone, In this video, we will discuss about access control of files in Linux OS. In simple words, we will discuss about file permissions, different types of users of a file, chmod command, basic and special types of file …