Using Uname Command on Linux with Examples
We will explain the “uname” command that you can use on your Linux operating system. With this command, you can get the kernel information and …
Knowledge pool for Information Technologies
We will explain the “uname” command that you can use on your Linux operating system. With this command, you can get the kernel information and …
Active Directory is a directory service designed by Microsoft specifically for Windows Server and Client computer systems, which contains information such as a server, client …
According to Oracle Corporation, more than 500 new features have been introduced to Oracle users and the more you know these features, the easier and …
Every company that has an online working entity uses some kind of database to store data. SQL(Structured Query Language) servers are one of the most …
For Active Directory to transfer data between different locations efficiently, a system that can be modelled according to your physical network is needed. The Sites …
In the current information technology environment, server, application and network devices are monitored by many monitoring applications. Although applications can monitor, monitoring and reporting of …
SCOM (System Center Operation Manager), in its shortest term, is a product of the System Center family that is customized to monitor and report our …
After using the weaknesses of a machine, exploiting that machine and buying a meterpreter shell, I will talk about the mimetic module and its use …
Before we start with Gophish, we will explain what Phishing is. What is Phishing? It is a type of online attack in which fraudsters send …
DEP (Data Execution Prevention) is a security feature that comes with Windows XP SP2. It prevents some unauthorized codes from running on certain memory sections …