Javier Claussell

63 Flips | 2 Magazines | 365 Likes | 3 Following | 4 Followers | @Javiclass | For Ever Random... ;)

sdnpwn - An SDN Penetration Testing Toolkit

The Open Networking Foundation defines SDN as “The physical separation of the network control plane from the forwarding plane, and where a control …


A Survey of Network Traffic Monitoring and Analysis Tools

"sFlow" [sFlow03]originally developed by InMon Inc. is an industrial standard mechanism (defined in RFC 3176) to capture traffic from switches and …

ZIP command in Linux with examples

ZIP is a compression and file packaging utility for Unix. Each file is stored in single .zip {.zip-filename} file with the extension .zip.<p>zip is used …


Sysdig – A Powerful System Monitoring and Troubleshooting Tool for Linux

Sysdig is an open-source, cross-platform, powerful and flexible system monitoring and troubleshooting tool for Linux; it also works on Windows and …


Smart code helps your phone browse the web twice as quickly

Many attempts at improving the speed of mobile web browsing involve some obvious sacrifices: Google's Accelerated Mobile Pages alter how you view the pages, while proxies introduce the risk of someone intercepting your sensitive data. Researchers have found a way to boost performance without those …

Black Lab Enterprise Linux 11.0.3 Ubuntu-based operating system now available

The perfect Linux distribution doesn't exist. Take it from someone that does a lot of distro-hopping -- you will find yourself searching <i>forever</i>. …


Analyzing Network Packets with Wireshark, Elasticsearch, and Kibana


Easily Update Ubuntu and Debian Systems with uCareSystem

Title: Easily Update Ubuntu and Debian Systems with uCareSystem28 JulLearn more


How to Calculate Network Addresses with ipcalc

Title: How to Calculate Network Addresses with ipcalc10 AugLearn more


How to Write iptables Rules for IPv6

Title: How to Write iptables Rules for IPv63 AugLearn more


Build a Real VPN with OpenVPN

Title: Build a Real VPN with OpenVPN9 MayLearn more


Turn a laptop hard drive into a portable drive

If you've upgraded your laptop, don't discard that "naked" drive. You can put it back to work as external storage.<p>What's the single best way to upgrade a laptop? Easy: Take out the mechanical hard drive and replace it with a solid-state drive (SSD).<p>You'll enjoy faster performance, longer battery …

Computer Hardware

Min – A Lighter, Faster and Secure Web Browser for Linux

Min is a minimal, simple, fast and cross-platform web browser, developed with CSS and JavaScript using Electron framework for Linux, Window and Mac …


Tor and Proxychains - Tip for Hacking Anonymous

<b>Anonymity</b> is an interesting protective weapon, whether inside or outside the computer network. In this post I’ll introduce two basic tips on this …


Using apt-get Commands In Linux [Complete Beginners Guide]

<i>Brief: This beginner’s guide shows you what you can do with apt-get commands in Linux, how to use it to find new packages, install and upgrade new</i> …

11 Questions to Ask Before Accepting a LinkedIn Invitation

Why you shouldn't accept every invitation to connect on LinkedIn--and how to decide which ones you should.<p>Should I accept?<p>That's the question many people ask every day when using LinkedIn, the world's largest professional social network. I used LinkedIn extensively when starting my business, and it …

I Ditched My iPhone for Samsung’s New Note 7 for a Week—Here’s What I Loved and Hated

Tryouts<p>By •<p>Advertisement<p>Advertisement<p>Observer<p>Slideshow | List<p>- / 8<p>Back<p>You may look at the new Samsung Galaxy Note 7 and think, “Why do I need that?” …

How to Completely Erase Data to Avoid Privacy Leak on your iPhone

If you’re thinking of selling or trading in your current iPhone ahead of the iPhone 6S’s release, you probably know that you’ll need to wipe your …

Operating Systems

This Is What the World's Spies Used Instead of MSN Messenger

InfoWorkSpace was pretty advanced for 2003, but damn is it painful to look at today.<p>What do spies use to chat online? A terribly ugly Windows programme.<p>At least, that's what the Five Eyes intelligence alliance (made up of the US, UK, Australia, New Zealand and Canada) was using back in 2003, …

Google says it didn't remove 'Palestine' from its maps

Google got in trouble this week for allegedly removing the ‘Palestine’ label from the neighboring region of Israel.<p>GIFs, hashtags, videos and petitions were circulated online in a bid to urge the company to curb its political agenda and amend its map.<p>“75% of European digital ecosystem is present at …


What Is Emotional Intelligence?

Emotional intelligence can superficially be defined as 'the ability to identify and manage one's own emotions and the emotions of others'.<p>An emotion …

Uh-oh! Microsoft Leaks 'Golden Keys' to Windows Devices

Microsoft (msft) messed up.<p>The tech giant inadvertently leaked a “backdoor” means to digitally bypass Secure Boot, a firmware component designed to …

The 1 Simple Way to Instantly Increase Your Visibility on LinkedIn

Here's an easy way to increase the visibility and social media appeal of the content you're publishing on LinkedIn.<p>In today's online landscape, the best headlines and summary text rule the day.<p>You have mere moments to catch someone's attention before he or she scrolls right by without a second …

Curb Appeal

Amazon Web Services announces Layer 7 application load balancer, 47% cut in cost of Elastic Block Store ‘snapshots’

Werner Vogels, Amazon Web Services’s chief technology officer, this morning announced a new application load balancer as part of the company’s …

Cloud Computing

6 Tips for Turning Your Email Signature Into a Powerful Marketing Weapon

You could be getting a whole lot more out of your emails, if you just make this one change.<p>The average worker sends 40 business emails every day, according to a study by the Radicati Group. That's more than 10,000 emails per employee each year, or more than one million emails a year for a company …