Ankan Basu

Using and Not using Shadow File in Linux

less /etc/passwd # the command below will destroy shadow feature # and you will be able to view ...

Details

Linux Run Level Reference

ID Name Description 0 Halt Shuts down the system. 1 Single-user mode Mode for administrative tasks. 2 Multi-user ...

Details

Adding users and groups in linux

Adding users: # create a new user sudo adduser wonderfulperson sudo useradd wonderfulperson # udpate password sudo password ...

Details

Nessus for Home Users

Nessus is one of the most well known network vulnerability tool available on the market. If you are ...

Details

Vulnerability Assessment

Vulnerability Assessment – Find vulnerabilities in a system or network – Better than just a port scanner. – ...

Details

Set up a VM using Vagrant

# Install vagrant. #create a directory to work on vagrant mkdir learnPlaybooks cd learnPlaybooks # use vagrant to ...

Details

Git Stash Commands

Most common commands that I use. Self-explanatory. Save and List Stash git stash save “Some message” git stash ...

Details

.gitignore file

Ignoring files in git using .gitignore ====================================== create a .gitignore file and put it in the root of ...

Details

Delete un-tracked files from git

Removing un-tracked files We can use git clean -f to clean up un-tracked files in the working directory. ...

Details