Entries Tagged with ‘Tutorial’

As you might already know, the Leap Motion is an input device for Windows, Mac and Linux systems. Once it is connected to a computer, it creates a space in your room in which it will recognize all your fingers and their movements. It is very similar to the Microsoft Kinect; however, the Leap Motion […]

(Continue reading…)

Today I added two new cheat sheets: RHCE Cheat Sheet RHEV/RHCVA Especially the RHEV/RHCVA cheat sheet is not very comprehensive, but maybe it is still a little helpful when learning for the RHCVA exam. Enjoy!

(Continue reading…)

In the last post about Cfengine 3 we talked about a simple script which creates a file and writes something into it. Today, we will create a simple example script which checks if two specified services are running. Writing the script Connect to your Linux box and create the following file: /var/lib/cfengine3/inputs/example2.cf body common control […]

(Continue reading…)

Every system admin normally wants to be in full control of his box. One part of the “full control”-thing is to monitor your Linux system. You usually want to know what happens right now and how it affects the system. There are tools like iotop, cbm, htop, top, vmstat and so on, but none of […]

(Continue reading…)

This is a quick installation guide, based on the official manual by Linbit. It contains nothing new and is more a note than a real guide. I need the commands from time to time, so I thought it might be a good idea to collect all the commands being necessary to get a basic DRBD […]

(Continue reading…)

Download The Joomla Hacking Compendium here. With great pleasure I hereby announce the availability of the new “The Joomla Hacking Compendium”. It contains almost 1000 lines of pure knowledge and shows you the way to hack and protect Joomla. It contains the following chapters: Please find an excerpt below:

(Continue reading…)

Some of you might have read my little tutorial about how to use Google Skipfish for web vulnerability scanning. While I was fascinated by the efficiency and speed of this application, I started to use it more often. Although manual testing can’t be replaced by a machine, web vulnerability scanners are still a helping hand. During […]

(Continue reading…)