Tag Archives: Examples

Publicly Available Tools Seen in Cyber Incidents Worldwide

Remote Access Trojan: JBiFrost First observed in May 2015, the JBiFrost RAT is a variant of the Adwind RAT, with roots stretching back to the Frutas RAT from 2012. A RAT is a program that, once installed on a victim’s machine, allows remote administrative control. In a malicious context, it …

Read More »

Practical Examples of Linux Find Command, Find Command Examples for Ubuntu, Mint, Debian, CentOS, Fedora and all Linux distributions

Practical Examples of Linux Find Command, linux find command, find command examples The Man 2 - blackMORE Ops

In Unix-like and some other operating systems, find is a command-line utility (Find Command Examples here) can be used to search through one or more directory trees of a file system, locates files based on some user-specified criteria and applies a user-specified action on each matched file. The possible search …

Read More »

Privacy Policy on Cookies Usage

Some services used in this site uses cookies to tailor user experience or to show ads.