Forwarded from Deleted Account
void00r.github.io
Neo Void
Void Filled with Neons.
Where was UNiX OS first developed?
Anonymous Quiz
0%
Microsoft Corp., USA
74%
AT&T Bell Labs, USA
5%
IBM, USA
21%
Boreland International, USA
Who first developed UNiX OS?
Anonymous Quiz
0%
Linus Torvalds
16%
Bijarne Stroustrup
0%
Richard Stallman
84%
Dennis Ritchie and Ken Thompson
In which language Unix is written?
Anonymous Quiz
86%
C Language
0%
C++ Language
5%
Assembly Language
10%
COBOL Language
Which of the below is TRUE for unix?
Anonymous Quiz
10%
Unix is a single user, single tasking OS.
10%
Unix is multiuser, single tasking OS
5%
Unix is single user, multi tasking OS.
75%
Unix is multi user, multi tasking OS.
Advanced diskpartition #quicknotes #notes
partitioning using fdisk
primary {sda1 sda2 sda3}, extended {sda4}
physical volume
pvcreate
pvcreate /dev/sda1 /dev/sda2 /dev/sda3
pvs or pvdisplay - for showing
volume group
vgcreate
vgcreate <newname> <path of volumes>
vgs or vgdisplay
logical volume
lvcreate
lvcreate -L +20G -n <newname> <vg name>
lvrename
lvextend
lvreduce
partitioning using fdisk
primary {sda1 sda2 sda3}, extended {sda4}
physical volume
pvcreate
pvcreate /dev/sda1 /dev/sda2 /dev/sda3
pvs or pvdisplay - for showing
volume group
vgcreate
vgcreate <newname> <path of volumes>
vgs or vgdisplay
logical volume
lvcreate
lvcreate -L +20G -n <newname> <vg name>
lvrename
lvextend
lvreduce
Useful bash functions for faster command line usage in a terminal
@linux_mint_resources
cmd-copy() { "${@}" | xclip -sel clip ; }
Syntax: $ cmd-copy <command>
Example: $ cmd-copy sudo apt-get update
This will copy the output of sudo apt-get command in your clipboardcmd-help() { curl cheat.sh/"${1}" ; }
Syntax: $ cmd-help <command>
Example: $ cmd-help tar
This will show you the usage of tar commandcmd-upload() { "${@}" | curl -F 'f:1=<-' ix.io ; }
Syntax: $ cmd-upload <command>
Example: $ cmd-upload neofetch --stdout
This will upload the output of neofetch command to a pastebin service@linux_mint_resources
Forwarded from theooo's stash.
Open Sourcing our Firmware
https://frame.work/blog/open-sourcing-our-firmware
https://frame.work/blog/open-sourcing-our-firmware
Framework
Open Sourcing our Firmware
We want to empower you to participate directly in the creation of Framework product ecosystems. We have a couple of updates to share around expanding community access.
I am deleting my mobile telegram client.
First step to delete telegram.
Available only on matrix.
void00r:matrix.org
First step to delete telegram.
Available only on matrix.
void00r:matrix.org
Forwarded from Easy Physics
This media is not supported in your browser
VIEW IN TELEGRAM
A fascinating hobby is the American engineer Russell Buck, who finds "Easter eggs" with pop culture characters inside chips and microchips.
EP
EP
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.
The included LiveCD provides a complete Linux programming and debugging environment—all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:
• Program computers using C, assembly language, and shell noscripts
• Corrupt system memory to run arbitrary code using buffer overflows and format strings
• Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
• Outsmart common security measures like nonexecutable stacks and intrusion detection systems
• Gain access to a remote ser
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.
The included LiveCD provides a complete Linux programming and debugging environment—all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:
• Program computers using C, assembly language, and shell noscripts
• Corrupt system memory to run arbitrary code using buffer overflows and format strings
• Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
• Outsmart common security measures like nonexecutable stacks and intrusion detection systems
• Gain access to a remote ser
marwanhawari/stew
🥘 An independent package manager for compiled binaries.
https://github.com/marwanhawari/stew
🥘 An independent package manager for compiled binaries.
https://github.com/marwanhawari/stew
GitHub
GitHub - marwanhawari/stew: 🥘 An independent package manager for compiled binaries.
🥘 An independent package manager for compiled binaries. - marwanhawari/stew