When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. ifconfig - Wikipedia

    en.wikipedia.org/wiki/Ifconfig

    Many Linux distributions have deprecated the use of ifconfig and route in favor of the software suite iproute2, such as ArchLinux [3] or RHEL since version 7, [4] which has been available since 1999 for Linux 2.2. [5] iproute2 includes support for all common functions of ifconfig(8), route(8), arp(8) and netstat(1). It also includes multicast ...

  3. Wireless tools for Linux - Wikipedia

    en.wikipedia.org/wiki/Wireless_tools_for_Linux

    Wireless tools for Linux is a collection of user-space utilities written for Linux kernel-based operating systems to support and facilitate the configuration of device drivers of wireless network interface controllers and some related aspects of networking using the Linux Wireless Extension.

  4. sudo - Wikipedia

    en.wikipedia.org/wiki/Sudo

    sudo (/ s uː d uː / [4]) is a program for Unix-like computer operating systems that enables users to run programs with the security privileges of another user, by default the superuser. [5] It originally stood for "superuser do", [ 6 ] as that was all it did, and this remains its most common usage; [ 7 ] however, the official Sudo project ...

  5. tcpdump - Wikipedia

    en.wikipedia.org/wiki/Tcpdump

    tcpdump is a data-network packet analyzer computer program that runs under a command line interface.It allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached. [3]

  6. Crack (password software) - Wikipedia

    en.wikipedia.org/wiki/Crack_(password_software)

    The first public release of Crack was version 2.7a, which was posted to the Usenet newsgroups alt.sources and alt.security on 15 July 1991. Crack v3.2a+fcrypt, posted to comp.sources.misc on 23 August 1991, introduced an optimised version of the Unix crypt() function but was still only really a faster version of what was already available in other packages.

  7. ethtool - Wikipedia

    en.wikipedia.org/wiki/Ethtool

    ethtool is the primary means in Linux kernel-based operating systems (primarily Linux and Android) for displaying and modifying the parameters of network interface controllers (NICs) and their associated device driver software from application programs running in userspace.

  8. John the Ripper - Wikipedia

    en.wikipedia.org/wiki/John_the_Ripper

    One of the modes John can use is the dictionary attack. [6] It takes text string samples (usually from a file, called a wordlist, containing words found in a dictionary or real passwords cracked before), encrypting it in the same format as the password being examined (including both the encryption algorithm and key), and comparing the output to the encrypted string.

  9. Paradox (warez) - Wikipedia

    en.wikipedia.org/wiki/Paradox_(warez)

    PARADOX (PDX) is a warez–demogroup; an anonymous group of software engineers that devise ways to defeat software and video game licensing protections, a process known as cracking, which is illegal in most jurisdictions. They distribute cracks (software patches), keygens (key generators