Two-step verification (also known as Two-factor authentication, abbreviated to TFA) is a process involving two stages to verify the identity of an entity trying to access services in a computer or in a network. This is a special case of a multi-factor authentication which might involve only one of the …
Read More »kSar sar grapher – A Graphical interface for sysstat sar data
sysstat sar provides command line based monitoring data. Those who are new or migrating from Windows or MAC and used to the graphical output, it might get confusing and boring. Hence the development of kSar sar grapher. kSar sar grapher is a graphing tool that can graph for Linux, MAC …
Read More »Kali Linux remote SSH – How to configure openSSH server
Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers. It connects, via a secure channel over an insecure network, a server and a client running SSH server and SSH client programs, respectively. …
Read More »How to use sar for monitoring your Linux system? sysstat sar examples and usage
This article describes how to install and use sar (sysstat) a system performance tools for Linux. It comes with plenty of sar examples and usage. Sar is part of the sysstat package. According to the package description it includes the following system performance tools: sar: collects and reports system activity …
Read More »Correct way to install Virtualbox Guest Additions packages on Kali Linux and create shared folders
It seems there’s lots of confusion on what is the correct way to install VirtualBox guest additions packages on Kali Linux. Unfortunately, there’s only one way to do it! So if you’re not following the steps below, you won’t be able to use Kali Linux is full screen properly (seamless …
Read More »