Home » Archive by category "Home" (Page 3)

How To Share Mouse And Keyboard Using Synergy?

If you are a computer nerd then your workplace should be cluttered with multiple computers and its input peripherals. To get rid of this untidy mess here comes a great innovative tool to share your mouse, keyboard and clipboard across computers.  Synergy is an ultimate tool which simply allows multiple systems to...
Continue reading »

How To Download Entire Website using Wget ?

Linux is a badass open-source operating system, with overwhelming feature to make the user happy. If you would like to tinkering your experience more on Linux with online tutorials, here’s how you can knock down any website to your local drive using a linux command “wget“. The man page...
Continue reading »

Basic Anonimity With TOR Online.

This article is how to hide your IP address, and how to prevent some one from getting it. It only deals with the basics of it. I will go further on it, in other articles in the future. You will need Mozilla Firefox in order to get anonymous, since it is...
Continue reading »

How To Access SSH Server From The Browser ?

As you know SSH ( Secure Shell ) is a cryptographic Network Protocol for secure data communication over the notoriously insecure network. The dependent properties to access SSH protocol is just to have a SSH Server and Client setup. In this post I’m gonna explain the steps to install SSH server in the...
Continue reading »

How to use Internet Relay Chat ?

Internet Relay Chat was so famous in 90′s when people started to experience internet as a new communication tool. Later, Yahoo ! sweeps the Chat crowd with its Yahoo Messenger, then Rediffbol and so many have entered with their messenger applications. Of course, very few were able to stand...
Continue reading »

HOW TO: Send Fake Mail Using Any Email ID?

Electronic-Mail is one of the popular digital message connecting medium in Internet over decades, as a result it is the number one target for hackers to play around human intuitions. They psychologically manipulate human to give up confidential information, this sort of extracting private information is called as Social Engineering attack. The Social Engineering techniques are based...
Continue reading »

HOW TO: Create ISO images from Terminal in Ubuntu ?

HOW TO: Create ISO image?
We are having a trend where geeks used to bundle files and folders as filename.iso image to upload in Torrent or to send the file across many people, to make the life easier for all. In Linux this task could be handled in multiple ways by using mkisofs program or using Genisoimage utility and...
Continue reading »