shishirceh.blogspot.com shishirceh.blogspot.com

shishirceh.blogspot.com

Ethical Hacking and Network Security

Ethical Hacking and Network Security. Monday, December 8, 2014. Mounting HFS MAC filesystem into Redhat Linux 6. Mounting HFS filesystem into Redhat Linux 6. Rpm - import http:/ elrepo.org/RPM-GPG-KEY-elrepo.org. Uvh http:/ www.elrepo.org/elrepo-release-6-6.el6.elrepo.noarch.rpm. Http:/ elrepo.org/tiki/tiki-index.php. For your version of redhat/centos. Connect the drive, it should automatically mounted or mount using following commands:. Ls / to list content of the drive. Tuesday, October 14, 2014. Examp...

http://shishirceh.blogspot.com/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR SHISHIRCEH.BLOGSPOT.COM

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

October

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Saturday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 4.4 out of 5 with 14 reviews
5 star
9
4 star
4
3 star
0
2 star
0
1 star
1

Hey there! Start your review of shishirceh.blogspot.com

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

0.2 seconds

FAVICON PREVIEW

  • shishirceh.blogspot.com

    16x16

  • shishirceh.blogspot.com

    32x32

  • shishirceh.blogspot.com

    64x64

  • shishirceh.blogspot.com

    128x128

CONTACTS AT SHISHIRCEH.BLOGSPOT.COM

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
Ethical Hacking and Network Security | shishirceh.blogspot.com Reviews
<META>
DESCRIPTION
Ethical Hacking and Network Security. Monday, December 8, 2014. Mounting HFS MAC filesystem into Redhat Linux 6. Mounting HFS filesystem into Redhat Linux 6. Rpm - import http:/ elrepo.org/RPM-GPG-KEY-elrepo.org. Uvh http:/ www.elrepo.org/elrepo-release-6-6.el6.elrepo.noarch.rpm. Http:/ elrepo.org/tiki/tiki-index.php. For your version of redhat/centos. Connect the drive, it should automatically mounted or mount using following commands:. Ls / to list content of the drive. Tuesday, October 14, 2014. Examp...
<META>
KEYWORDS
1 check
2 yum install kmod hfsplus
3 fdisk l
4 mkdir /externaldrive
5 mount /dev/sdb1 /externaldrive
6 cd /externaldrive
7 posted by
8 shishir
9 no comments
10 email this
CONTENT
Page content here
KEYWORDS ON
PAGE
check,yum install kmod hfsplus,fdisk l,mkdir /externaldrive,mount /dev/sdb1 /externaldrive,cd /externaldrive,posted by,shishir,no comments,email this,blogthis,share to twitter,share to facebook,share to pinterest,installing zabbix packages,non supported
SERVER
GSE
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

Ethical Hacking and Network Security | shishirceh.blogspot.com Reviews

https://shishirceh.blogspot.com

Ethical Hacking and Network Security. Monday, December 8, 2014. Mounting HFS MAC filesystem into Redhat Linux 6. Mounting HFS filesystem into Redhat Linux 6. Rpm - import http:/ elrepo.org/RPM-GPG-KEY-elrepo.org. Uvh http:/ www.elrepo.org/elrepo-release-6-6.el6.elrepo.noarch.rpm. Http:/ elrepo.org/tiki/tiki-index.php. For your version of redhat/centos. Connect the drive, it should automatically mounted or mount using following commands:. Ls / to list content of the drive. Tuesday, October 14, 2014. Examp...

INTERNAL PAGES

shishirceh.blogspot.com shishirceh.blogspot.com
1

Ethical Hacking, Network Security and System Administration: October 2014

http://shishirceh.blogspot.com/2014_10_01_archive.html

Ethical Hacking, Network Security and System Administration. Tuesday, October 14, 2014. Installing Zabbix - Network Monitoring System. ZABBIX Network Monitoring System. Red Hat Enterprise Linux / CentOS. Supported for versions: RHEL 5, RHEL 6, Oracle Linux 5, Oracle Linux 6, CentOS 5, CentOS 6. Installing repository configuration package. Install the repository configuration package. This package contains yum configuration files. Zabbix 2.2 for RHEL5, Oracle Linux 5, CentOS 5:. Edit database configuratio...

2

Ethical Hacking, Network Security and System Administration: May 2011

http://shishirceh.blogspot.com/2011_05_01_archive.html

Ethical Hacking, Network Security and System Administration. Saturday, May 28, 2011. How to grab server banners! Some examples of service ports used for banner grabbing are those used by Hyper Text Transfer Protocol (HTTP), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP); ports 80, 21, and 25 respectively. Tools commonly used to perform banner grabbing are Telnet, which is included with most operating systems, and Netcat. Root@proxy] telnet www.targethost.com 80. HEAD / HTTP/1.0.

3

Ethical Hacking, Network Security and System Administration: Checking MD5 & SHA1 Checksums

http://shishirceh.blogspot.com/2014/10/checking-md5-sha1-checksums.html

Ethical Hacking, Network Security and System Administration. Tuesday, October 7, 2014. Checking MD5 and SHA1 Checksums. Checking MD5 and SHA1 Checksums. Move the downloaded file and the associated MD5 hash file to a folder and execute the following command from the command line. Md5sum -c datei.md5. To check the SHA1 file, execute the following command similarly. Sha1sum -c datei.sha1. Fcivexe -v -md5 datei.md5. To check the SHA1 file, execute the following command similarly. Md5sum datei datei.md5.

4

Ethical Hacking, Network Security and System Administration: Exporting/Importing VMs in Xenserver using 'xe' command

http://shishirceh.blogspot.com/2014/10/exportingimporting-vms-in-xenserver.html

Ethical Hacking, Network Security and System Administration. Tuesday, October 7, 2014. Exporting/Importing VMs in Xenserver using 'xe' command. Exporting VM to xva using 'xe' command:. Importing .xva file to VM using 'xe' command:. Xe vm-import filename=/mnt/Export/ name of ova.xml. It imports the VM into default SR (Storage Repository) and returns uuid of imported VM on success. To display list of Storage Repository and its details including uuid. Xe vm-import filename=/mnt/Export/ name of xva force=true.

5

Ethical Hacking, Network Security and System Administration: December 2012

http://shishirceh.blogspot.com/2012_12_01_archive.html

Ethical Hacking, Network Security and System Administration. Monday, December 17, 2012. Backtrack Wireless: Packet Sniffing and Injecting. Packet Sniffing and Packet Injecting. Management frames: Management frames are responsible for maintaining. Communication between the access points and wireless clients. Control frames: Control frames are responsible for ensuring a proper exchange of. Data between the access point and wireless clients. Are no sub-types for data frames. Packet Sniffing with Wireshark.

UPGRADE TO PREMIUM TO VIEW 11 MORE

TOTAL PAGES IN THIS WEBSITE

16

LINKS TO THIS WEBSITE

prabinacharya.wordpress.com prabinacharya.wordpress.com

Stuck with forgotten Excel passwords? | prabin.acharya

https://prabinacharya.wordpress.com/2015/06/09/stuck-with-forgotten-excel-passwords

Stuck with forgotten Excel passwords? However if the thing you’ve protected is Excel file, then there could be solution depending upon the level of password protection. Listed below are few tricks for unlocking password protected Excel files:. 1 Sheet Level / Workbook level protection:. Very often we find a good excel template for various use. However, the template is password protected i.e. one can’t make modification.But what if you want to make modifications in the template? 2 Code level protection:.

prabinacharya.wordpress.com prabinacharya.wordpress.com

BlackMart Alpha — Every Applications FREE of charge for your Andriod | prabin.acharya

https://prabinacharya.wordpress.com/2013/08/28/blackmart-alpha-every-applications-free-of-charge-for-your-andriod

BlackMart Alpha — Every Applications FREE of charge for your Andriod. How long have you been using your Android device? And if you’ve been using it for long, I bet you’ve installed many applications: some free , some trial versions and there are these games that you want to play but they cost you some $ . And add to that various Productivity tools that you’d like to use but alas all the ones that you desired are paid only. So many thanks to Shreeram Sir. Get the App here:. PS How About Apple? You are com...

prabinacharya.wordpress.com prabinacharya.wordpress.com

पुनर्निर्माण अनि सहयोग – गर्ने के त | prabin.acharya

https://prabinacharya.wordpress.com/2015/06/16/पुनर्निर्माण-अनि-सहयोग-ग

प नर न र म ण अन सहय ग – गर न क त. ह ह म ल ई यस त सहय गहर क आवश यक त छ, तर ह म र उध य गहर क क षमत अन भव ष य ह र द सरक रल सहय ग स व क र न अन त यसल ई उच त पर च लन गर न पर दछ स म न टक हकम ह म र उध य गहर क क ल क षमत कत ह? ह म र उध य गहर ल कत उत प दन गर नसक छन? फ र ज औ स म न ट क प रस गत र भ रत य सहय गक स म न टल ई कसर उपय ग गर न त(यद प र प त ह न न भय भन )? Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public). June 16, 2015. Build...

prabinacharya.wordpress.com prabinacharya.wordpress.com

स्नेह | prabin.acharya

https://prabinacharya.wordpress.com/2014/11/03/स्नेह

लगनख ल, लगनख ल…. If tomorrow never comesssssssssss.)टक टक टक….(. अर व ह, आज र श फल र म र छ क क य ह. Excuse me, अल कत उत सर द न स न…. ठ क छ, म र ल स ट स टप त ह , झ य ल न ख ल न प इन छ…. 8230;……. 8230;यस त ध ल छ, क झ य ल ख ल न पर य ह ल …. झ य ल बन द गर न स न, ध ल ध ल भइसक य …. Oh सर …. 8230;श र द ल 1 minute: Today’s horoscope You’d be sitting next to A beautiful girl, njoy J ). ट ड ङ ग…. 10 notifications….). 8230;…………………. लगनख ल, लगनख ल…. Shyam: @श र द ल milyo ta hijoko horoscope? श र द ल: @Shyam एकदम सह.

prabinacharya.wordpress.com prabinacharya.wordpress.com

Prabin.Acharya | prabin.acharya

https://prabinacharya.wordpress.com/author/prabinacharya

प नर न र म ण अन सहय ग – गर न क त. ह ह म ल ई यस त सहय गहर क आवश यक त छ, तर ह म र उध य गहर क क षमत अन भव ष य ह र द सरक रल सहय ग स व क र न अन त यसल ई उच त पर च लन गर न पर दछ स म न टक हकम ह म र उध य गहर क क ल क षमत कत ह? ह म र उध य गहर ल कत उत प दन गर नसक छन? फ र ज औ स म न ट क प रस गत र भ रत य सहय गक स म न टल ई कसर उपय ग गर न त(यद प र प त ह न न भय भन )? June 16, 2015. Stuck with forgotten Excel passwords? Listed below are few tricks for unlocking password protected Excel files:. 2 Code level protection:.

prabinacharya.wordpress.com prabinacharya.wordpress.com

Turn your Laptop into Wifi HotSpot | prabin.acharya

https://prabinacharya.wordpress.com/2013/08/27/turn-your-laptop-into-wifi-hotspot

Turn your Laptop into Wifi HotSpot. We frequently come across many Wifi Hotspot and it’s great to have them free! Ever wanted Wifi HotSpot at your palce of choice? The first thing you’d think of is building a system with Wireless router and other necessary things. But wait, if you’ve already got some kind of internet connection, you can always share the same to make it work exactly like and Wifi HotSpot. What you should have:. 1 Laptop with Internet connection(Wired internet connection),. Netsh wlan set ...

prabinacharya.wordpress.com prabinacharya.wordpress.com

D.V. | prabin.acharya

https://prabinacharya.wordpress.com/2014/11/07/d-v

घ र र…घ र र.घ र र…. 8230;ओय स ल उठ, कत स त छस. 8230;१० बज सम म पन स त छ क इ? ह ज फ र JD ह न स क क य ह? स ल मल ई न भन न पर छ न. क ऽऽऽ य र, र त म य च ह र क न , पछ न न द र ल ग न अन Two and half men न ह र कत ब ल प न द ए. 8230;त इट, क ग ख ल छ न ह ज स ट ल , म त फर स ट ह फ ह र र स त क , स ल अइल ह इल इट स ह र छ त ड र प भ क छ य प ल त ग र पब ट ज ल जस त छ…. ह ऽऽऽऽ अझ ब क छ ब र …. 8230;ल ल त र स ट क कम ल न ह रम ल अन आज ग ड फ र इड गर न ह इन? जम ब ल क भ ट क म …. Hmmmह न छ…बर ब ज ल ई न भन न,. स ल उठ अब कत स त छस ….

prabinacharya.wordpress.com prabinacharya.wordpress.com

ट्वाइलेट छाप चप्पल | prabin.acharya

https://prabinacharya.wordpress.com/2014/11/02/ट्वाइलेट-छाप-चप्पल

ट व इल ट छ प चप पल. ह न ए ब ढ त मल ई नप ग न क छ र, य थ त र , अन म नल ज ड क चप पल लग ई ह ड क? फ र अस त सम म त य ट व इल टम र ख क थ य , अल कत पन च ख न ध क ख य ल छ न ह त मल ई. ल क भ छ र य चप पल? आ….हज र पन …. ध र प र न भइसक य न य चप पल त हज रक अर चप पल न नभए जस त , अस त भख खर ठ ल ब ह र ल ब ब ल ई ज ड म ल उन ह न छ भन र ल र क त य ब क ल भ व द र चप पल लग ए त भ ग न. त र छ र ब ह र प कम उछन अन बज रम ज द ख य त यह ट प र घर आउ छन , प स थ प र कम क छन नत र तह कसर लग उन न! अन त न हर ल क म र चप पल ह र र छ र ब ह गर क ह न र?

UPGRADE TO PREMIUM TO VIEW 1 MORE

TOTAL LINKS TO THIS WEBSITE

9

OTHER SITES

shishiranimator.blogspot.com shishiranimator.blogspot.com

Animation

Ask whatever u want on Animation. Sunday, July 22, 2012. Links to this post. Saturday, May 19, 2012. Links to this post. Thursday, February 2, 2012. Links to this post. Monday, December 12, 2011. Doodle - Warm Up. Links to this post. Sunday, September 4, 2011. Making of Tare Zameen Par. Links to this post. Thursday, August 4, 2011. The world's largest stop-motion animation set, shot on a Nokia N8. Links to this post. Tuesday, July 19, 2011. Links to this post. Sunday, July 3, 2011. Links to this post.

shishirastro.sairamgems.com shishirastro.sairamgems.com

ShiShirAstro.Com

Click to Solve your problem. Select Birth Rashi :. Mesh-ARIES CHU, CHE, CHO, LA,LI, LEE, LU,LOO,LE,LO,A,E,U.E,A. Vrisha-TAURUS O,V,A,VI,VEE,VU,VOO,BA,B1,BEE,BU,BOO,VE,VO,BE,BO,KA,KI,KEE. Mithuna-GEMINI KU,GH,CHH,KE,KO,HI,HEE, KE,KO,HI,HEE. Kark-CANCER HA,HE,HO,DA, FOR (DAMRU). Singh-LEO MAA,MI,MEE,MU,MOO,ME,MO, TA FOR (TAMATAR). Kanya-VIRGO PAA, PI, PEE, DHA FOR (DHOLAK),PU, POO, THA,PE, PO, RA, RI, REE. Tula-LIBRA RU, ROO, RE, TO, TA,TI, TEE, TU, TOO, TE, TO. Makar-CAPRICORN KH,GA, GI, GEE, GU, GOO, GE.

shishirbakshi.com shishirbakshi.com

Shishir Bakshi

shishirbhat.com shishirbhat.com

Ring0 - The Inner Circle

Ring0 - The Inner Circle. Ring0 - the inner most layer in the processor's privilege ring. October 27, 2014. How Big Are Your Functions? Couple of weeks back, there was a need to find out the code size of functions in a program I had written. I was just curious as to which functions were the biggest space hoggers. By 'code size of functions', I mean the number of bytes a function's machine code occupy in the .text. Disassembler to the rescue! First thing that came to my mind was to use dumpbin. Reading th...

shishirbrainbank.blogspot.com shishirbrainbank.blogspot.com

Brain Bank

This Blog gives You Knowledge and Good Information.It is Good For MBA/RAS/IAS And Other Exams.This Blog is also good who belongs to IT. Saturday, February 9, 2013. A Complete Paper On Cloud Computing Security. Topic Includes about Cloud Computing Security. Read Full Paper or Download from here:-. Click Here to download. If this does not work then Copy and paste following link into your Address bar:-. Wwwijritcc.org/IJRITCC Vol 1 Issue 1/IJRITCC 1309.pdf. Links to this post. Wednesday, January 23, 2013.

shishirceh.blogspot.com shishirceh.blogspot.com

Ethical Hacking and Network Security

Ethical Hacking and Network Security. Monday, December 8, 2014. Mounting HFS MAC filesystem into Redhat Linux 6. Mounting HFS filesystem into Redhat Linux 6. Rpm - import http:/ elrepo.org/RPM-GPG-KEY-elrepo.org. Uvh http:/ www.elrepo.org/elrepo-release-6-6.el6.elrepo.noarch.rpm. Http:/ elrepo.org/tiki/tiki-index.php. For your version of redhat/centos. Connect the drive, it should automatically mounted or mount using following commands:. Ls / to list content of the drive. Tuesday, October 14, 2014. Examp...

shishirchauhan.com shishirchauhan.com

Shishir Chauhan | Personal Website | UI Front end Developer

I am Shishir Chauhan. Front end ui developer. Welcome to my sassy online portfolio. Here, you can find my works, know where I worked, reach me for future work or just candidly catch-up. A celebrity quiz created with the help of web-tools like HTML5 and CSS3. I have used PHP, Ajax and MySql to fetch data dynamically. A fun, light-weight app created using HTML5 and CSS3. Check out cool CSS3 animations! Take a look here! We can locate all the stores within the seleted area. Consultant, Technical /. I had a ...

shishirchem.blogspot.com shishirchem.blogspot.com

Perfumer - Shishir Kumar Singh

shishircyb.wordpress.com shishircyb.wordpress.com

TREATISE | It is about some of my favourite TV Shows, Sports Personalities and a few Computer realted articles.

INDEX – To All Posts. It is about some of my favourite TV Shows, Sports Personalities and a few Computer realted articles. Stay updated via RSS. INDEX – To All Posts. 2014 Galantry Awardee List : Republic Day. 2014 Padma Awardee List : Republic Day. Rafael Nadal is Back as ATP World Number 1! Rafael Nadal wins US Open 2013! 2013 Gallantry Awardee List : Independence Day. Andy Murray Wins Wimbledon 2013! Tough Road Ahead for Roger Federer! Rafael Nadal wins (8th) French Open 2013! Mumbai Indians Win IPL 6!

shishireahmed.blogspot.com shishireahmed.blogspot.com

Maximizing Border

Wednesday, May 15, 2013. RAID and RAID Levels. There are many different ways to organize data in a RAID array. These ways are called "RAID. Levels". Different RAID levels have different speed and fault tolerance properties. Level 0 is not fault tolerant. Levels 1, 5, 6, and 1 0 are fault tolerant to a different degree - should. There are some more complex layouts: RAID 5E/5EE (integrating some spare space), RAID 50. The scope of this reference. RAID levels comparison chart. Minimum number of disks. Write...