unix-ninja.com unix-ninja.com

unix-ninja.com

unix-ninja :: Security and Information Technology Resources

Tips and resources for security and IT professionals. Building a Password Cracking Rig for Hashcat. Protecting your infrastructure with Google Authenticator as 2FA. Copying GNU/Screen scrollback buffer to file. Securing your private data with the Enterprise Cryptographic Filesystem. A cheat-sheet for password crackers. A lesson in legacy routing using virtual network interfaces. Suspending and resuming processes. Adding timestamps to Bash history. A Foundation for Buffer Overflow Attacks.

http://www.unix-ninja.com/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR UNIX-NINJA.COM

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

August

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Monday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 4.1 out of 5 with 15 reviews
5 star
8
4 star
4
3 star
1
2 star
0
1 star
2

Hey there! Start your review of unix-ninja.com

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

0.5 seconds

FAVICON PREVIEW

  • unix-ninja.com

    16x16

  • unix-ninja.com

    32x32

CONTACTS AT UNIX-NINJA.COM

Park Avenue Media

michelle gamba

27 ba●●●●●place

ami●●●lle , New York, 11701

United States

(516)●●●●●-4558
an●●●●●●●@gmail.com

View this contact

Park Avenue Media

michelle gamba

27 ba●●●●●place

ami●●●lle , New York, 11701

United States

(516)●●●●●-4558
an●●●●●●●@gmail.com

View this contact

Park Avenue Media

michelle gamba

27 ba●●●●●place

ami●●●lle , New York, 11701

United States

(516)●●●●●-4558
an●●●●●●●@gmail.com

View this contact

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

DOMAIN REGISTRATION INFORMATION

REGISTERED
2008 November 06
UPDATED
2012 November 07
EXPIRATION
EXPIRED REGISTER THIS DOMAIN

BUY YOUR DOMAIN

Network Solutions®

DOMAIN AGE

  • 16

    YEARS

  • 5

    MONTHS

  • 22

    DAYS

NAME SERVERS

1
ns1.synchronation.com
2
ns2.synchronation.com

REGISTRAR

GODADDY.COM, LLC

GODADDY.COM, LLC

WHOIS : whois.godaddy.com

REFERRED : http://registrar.godaddy.com

CONTENT

SCORE

6.2

PAGE TITLE
unix-ninja :: Security and Information Technology Resources | unix-ninja.com Reviews
<META>
DESCRIPTION
Tips and resources for security and IT professionals. Building a Password Cracking Rig for Hashcat. Protecting your infrastructure with Google Authenticator as 2FA. Copying GNU/Screen scrollback buffer to file. Securing your private data with the Enterprise Cryptographic Filesystem. A cheat-sheet for password crackers. A lesson in legacy routing using virtual network interfaces. Suspending and resuming processes. Adding timestamps to Bash history. A Foundation for Buffer Overflow Attacks.
<META>
KEYWORDS
1 toggle navigation
2 unix ninja
3 blog
4 search for articles
5 windows console commands
6 resources
7 subscribe to rss
8 an iptables cheat sheet
9 twitter
10 next
CONTENT
Page content here
KEYWORDS ON
PAGE
toggle navigation,unix ninja,blog,search for articles,windows console commands,resources,subscribe to rss,an iptables cheat sheet,twitter,next
SERVER
nginx/1.2.1
POWERED BY
PHP/5.4.39-0+deb7u1
CONTENT-TYPE
windows-1252
GOOGLE PREVIEW

unix-ninja :: Security and Information Technology Resources | unix-ninja.com Reviews

https://unix-ninja.com

Tips and resources for security and IT professionals. Building a Password Cracking Rig for Hashcat. Protecting your infrastructure with Google Authenticator as 2FA. Copying GNU/Screen scrollback buffer to file. Securing your private data with the Enterprise Cryptographic Filesystem. A cheat-sheet for password crackers. A lesson in legacy routing using virtual network interfaces. Suspending and resuming processes. Adding timestamps to Bash history. A Foundation for Buffer Overflow Attacks.

INTERNAL PAGES

unix-ninja.com unix-ninja.com
1

Protecting your infrastructure with Google Authenticator as 2FA

http://www.unix-ninja.com/p/Protecting_your_infrastructure_with_Google_Authenticator_as_2FA

Protecting your infrastructure with Google Authenticator as 2FA. It's 2015 and passwords are still the most widely used authentication mechanism for accessing our personal data and technology resources. Honestly, it's something I don't see changing for a long time to come, so if we're going to keep using passwords we may as well do what we can to suppliment a little extra security. Done right, even a little bit can go a long way. In the examples here, I will show you how to setup Google Auth to protect s...

2

Security and Information Technology Resources

http://www.unix-ninja.com/page/2

Copying GNU/Screen scrollback buffer to file. Securing your private data with the Enterprise Cryptographic Filesystem. A cheat-sheet for password crackers. A lesson in legacy routing using virtual network interfaces. Suspending and resuming processes. Adding timestamps to Bash history. A Foundation for Buffer Overflow Attacks. Firefox 31 and sec error ca cert invalid. Dynamic Linker Voodoo: aka How to LD PRELOAD. Google C Style Guide. Creating RSA public keys from private keys.

3

Adding timestamps to Bash history

http://www.unix-ninja.com/p/Adding_timestamps_to_Bash_history

Adding timestamps to Bash history. The Bash history feature is an invaluable tool which allows users to recall commands previously entered into their shell with relative ease. This makes it easy to enter repeated commands and keep track of what was done on a system. By default, however, a user is unable to see. The easiest example is as follows:. Export HISTTIMEFORMAT="%F %T ". It's worth noting that once you enable time-stamping, any existing entries in your .bash history file will automatically get...

4

A cheat-sheet for password crackers

http://www.unix-ninja.com/p/A_cheat-sheet_for_password_crackers

A cheat-sheet for password crackers. In this article I am going to share some bash scripting commands and regular expressions which I find useful in password cracking. Most of the time, we find hashes to crack via shared pastes websites (the most popular of them being Pastebin.) Isolating the hashes by hand can be a time consuming process; for that reason we are going to use regular expressions to make our life easier! An alternative could be with sed. Extract valid MySQL-Old hashes. Grep -E -o " b[a-zA-...

5

Copying GNU/Screen scrollback buffer to file

http://www.unix-ninja.com/p/Copying_GNUScreen_scrollback_buffer_to_file

Copying GNU/Screen scrollback buffer to file. Here's a quick pro tip. Have you ever been using GNU/Screen and decided you wanted to save the output of your current window to a file? It's actually pretty easy to do. Enter command mode by using. Once done, all you have to do is type the following:. Remember, paths should be relative to the location you opened screen from, and globbing may not work as expected. Comments powered by Disqus.

UPGRADE TO PREMIUM TO VIEW 7 MORE

TOTAL PAGES IN THIS WEBSITE

12

LINKS TO THIS WEBSITE

tuukkamerilainen.com tuukkamerilainen.com

Security Archives - Tuukka Merilainen makes IT work Tuukka Merilainen makes IT work

http://tuukkamerilainen.com/category/security

Security Archives - Tuukka Merilainen makes IT work. Tuukka Merilainen makes IT work. Affiliate system on Codeigniter. Simple backup system for Linux with Bash, Tar, Rsync and Crontab pt.1/2. Control Linux server via sms (reboot, get uptime, send mail, etc.) Part 1. What kind of University is Haaga-Helia. How to crack macbook admin password. How easy/hard it is to crack my wap2 secured wlan with weak password. I am now going to crack my macbook pro which is running OSx Mavericks. Like in router article.

UPGRADE TO PREMIUM TO VIEW 25 MORE

TOTAL LINKS TO THIS WEBSITE

26

SOCIAL ENGAGEMENT



OTHER SITES

unix-network.de unix-network.de

Unix-Network - Webhosting - Webdesign - Softwareentwicklung

Im Efeu 8 D-72766 Reutlingen 49-7121-490702 info@unix-network.de.

unix-networks.org unix-networks.org

Welcome to nginx!

If you see this page, the nginx web server is successfully installed and working. Further configuration is required. For online documentation and support please refer to nginx.org. Commercial support is available at nginx.com. Thank you for using nginx.

unix-new-orleans.com unix-new-orleans.com

Lamneth Inc

2117 Veterans Memorial Blvd #2268.

unix-neworleans.com unix-neworleans.com

Lamneth Inc

2117 Veterans Memorial Blvd #2268.

unix-news.blogspot.com unix-news.blogspot.com

unix-news

Wednesday, July 24, 2013. Monday, June 24, 2013. Unix-news test post content. Unix-news test post content. Thursday, May 23, 2013. Unix: Book Review - Absolute OpenBSD: Unix for the Practical Paranoid by Michael W. Lucas, Open Starch Press, 2013. The first edition of Absolute OpenBSD: UNIX for the Practical Paranoid was published 10 years ago in 2003 - ten years ago! Source http:/ www.itworld.com/operating-systems/357307/unix-book-review-absolute-openbsd-unix-practical-paranoid-michael-w-lucas-o. A fasci...

unix-ninja.com unix-ninja.com

unix-ninja :: Security and Information Technology Resources

Tips and resources for security and IT professionals. Building a Password Cracking Rig for Hashcat. Protecting your infrastructure with Google Authenticator as 2FA. Copying GNU/Screen scrollback buffer to file. Securing your private data with the Enterprise Cryptographic Filesystem. A cheat-sheet for password crackers. A lesson in legacy routing using virtual network interfaces. Suspending and resuming processes. Adding timestamps to Bash history. A Foundation for Buffer Overflow Attacks.

unix-notes.org unix-notes.org

start [unix-notes]

Извините, у вас не хватает прав для этого действия. В данный момент вы не в системе. Авторизируйтесь при помощи следующей формы. Для работы у вас должны быть включены куки (cookies). Получите новый: Установить новый пароль.

unix-notes.ru unix-notes.ru

Unix notes

Заметки по настройке Unix/Linux систем, хостинг-серверов. Установка простой системы мониторинга Munin. August 11th, 2011. Мунин идеально подойдет для тех администраторов, которым надо мониторить нагрузку (именно нагрузку, а не доступность! Одного-двух-трех серверов и не хочется заморачиваться с такими монстрами как Cacti. Итак, сначала установим пакет munin, к слову, это перловый скрипт и ставит с собой несколько перловых библиотек:. Релоадим апач и устанавливаем munin-node. На машине, на которой установ...

unix-o-linux.blogspot.com unix-o-linux.blogspot.com

Unix och Linux vid Blekinge Tekniska Högskola

Unix och Linux vid Blekinge Tekniska Högskola. Användning, programmering och administration av Linux och Unix-baserade operativsystem. Torsdag 18 oktober 2012. Vi startade denna bloggen i samband med en kursutveckling av en Linux and Unix-kurs. För egen del fick jag fullt upp med kurser i webbprogrammering och någon annan lärare tog över kursen som nu går på campus. För egen del lägger jag numer all kraft på webbplatsen som används i undervisningen för webbprogrammering på campus och distans. C: Program ...

unix-on.ru unix-on.ru

Аренда автомобилей с 22 лет казань -

Объявления аренда автовышки донецк. Аренда авто спорт харьков. Аренда авто москва внуково. Продать авто с пробегоми. Как продать. Автомобиль хундай купе с пробегоми под. Улица д 3 кор 13,авто телевизор с. Советую не брать автомат и обязательно пройти тест-драйв, так как я этого не сделал. В центре мне сказали, что коробка адаптивная и её нужно даже летом греть на первой передаче минуты 2-3, я офигел вообще. Извините за долгий рассказ, но. Аренда автомобилей на торжества. Наши транспортные средства оснаще...

unix-online.net unix-online.net

www.unixadministration.de | Karl-Heinz Fichtlscherer / freiberuflicher IT-Systemanalytiker

Linux Unix Virtualisierung Hochverfügbarkeit Systemmanagement Monitoring. Als freiberuflicher Systemanalytiker, Consultant und Administrator im Unix- und Linux-Umfeld kann ich Sie in allen Phasen Ihres Projekts umfassend unterstützen. Meine Tätigkeitsschwerpunkte liegen in den Bereichen Solaris, Linux, Webinfrastruktur sowie Systemmanagement- und Automatisierungslösungen. Sollten Sie Interesse an einer Zusammenarbeit haben, kontaktieren Sie mich bitte unverbindlich.