How to Compile, Configure, Build and Install New Linux Kernel from Scratch1. Download the latest kernel from kernel.org Code: wget http://www.kernel.org/pub/linux/kernel/v2.4/linux-2.4.19.tar.gz tar zxvf linux-2.4.19.tar.gz cd linux-2.4.19 2. Configure the kernel options This is where you select all the features yo...Sep 23, 2012·3 min read
Basic Idea of Creating Password Bruteforce toolIncludes 2 Basic Program :- Basic "C++" program. BruteForce Script in Python. Here is Sample Code of CPP Program, that will need Password :- Codes are messed up because of blogger. So Get a Code from here - https://github.com/krokite/basicBrut...May 2, 2012·3 min read
Big Picture that shows Linux Kernel Map [Kernel Map via Make Linux]Big Picture that shows Linux Kernel Map [Kernel Map via Make Linux] Click on Image to See in Better Resolution Go to this website. http://www.makelinux.net/kernel_map/ Click on Zoom, And Navigation to Learn More, about each file of Linux Kernel...Apr 5, 2012·1 min read
Insert, Update and Delete any Line without opening the file in LinuxHow comfortable would that be, if we ever have to Insert, Update, or Delete any line from a file without opening? A few times, we are in a situation, where we had to get rid of a few lines or Insert a few lines in the file. For the given purpose, we ...Jan 7, 2012·3 min read
Linux Important Hardware Utilities For Debugging Purpose and Fixing Operating System.The MAKEDEV Script Most device files will already be created and will be there ready to use after you install your Linux system. If by some chance you need to create one which is not provided then you should first try to use the MAKEDEV script. This ...Sep 30, 2011·3 min read
How to enable RUN ? if any viruses diabled your RUN!How to enable RUN ? if any viruses diabled your RUN! How to enable RUN ? if any viruses diabled your RUN, here’s the method to enable/disable RUN? If you are a computer user,then you might habe also heard about virus!there are few virus which do h...Aug 24, 2011·2 min read
Information Gathering with Google - Penetration Testing with GoogleClick on "Prev" or "Next" Button to Read The first phase in security assessment is focused on collecting as much information as possible about a target application. Information Gathering is the most critical step of an application security test. The ...Feb 7, 2011·1 min read