Hacking in UNIX


 
Thread Tools Search this Thread
Top Forums UNIX for Dummies Questions & Answers Hacking in UNIX
# 1  
Old 01-06-2006
Hacking in UNIX

Just give link to hacking soft like ipscanners, brutforses, firewalls , etc
maybe you know about new projects in this area
p.s. thanks for help

You might want to read the rules - Note # 11. Thread closed.

Last edited by RTM; 01-06-2006 at 11:48 AM..
 
Login or Register to Ask a Question

Previous Thread | Next Thread

6 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

kernel hacking

As you know we can output a string to the kernel /init/main.c using printk. I want to know if there are other function to make the appearance look better. is there any drawing function? color settings? if there is, i would thank if you name a few. (1 Reply)
Discussion started by: dr_mabuse
1 Replies

2. Cybersecurity

hacking

I want to start with hacking and learning it from the scratch! I have googled and found thousands of pages but I would like to know how to start really! It's always good to hear from security experts. please give me some links. the ones which are related to unix hacking. (1 Reply)
Discussion started by: messi777
1 Replies

3. Cybersecurity

What kind of hacking is going on here??

Connecting to the Internet with OpenVPN, the connection fails. Rerunning openvpn works second time round but the install is hacked at that point (e.g., a rogue 'java-security' update tries to install itself on 'yum update', yum however spots this and rejects the download, other basic things start... (3 Replies)
Discussion started by: GSO
3 Replies

4. Linux

Hacking

Im wondering how i can chat to some one (1 Reply)
Discussion started by: Neas
1 Replies

5. UNIX for Dummies Questions & Answers

Hacking

I asked my firend about hacking so he told me to come here. I want to know how to get Volumes I, II and III. Does anyone know how to help me and help me become a good hacker? This is what i came here to do!!!!!! (2 Replies)
Discussion started by: nfsu2
2 Replies

6. Post Here to Contact Site Administrators and Moderators

Hacking in the forums

I know that it's wrong, but it wasn't in the ULA when i read it. so, what are the restrictions on hack talk? i mean White-Hat hack talk, not the malicious kind. (3 Replies)
Discussion started by: boris888
3 Replies
Login or Register to Ask a Question
MAVEN(1)							   User Commands							  MAVEN(1)

NAME
Maven - Creates a link from a jar already installed in /usr/share/maven-repo. SYNOPSIS
mh_linkrepojar [option]... [pom] [link]... DESCRIPTION
Create symlinks from the jar in the Maven repository to any location, usually to a file located in /usr/share/java. Where [pom] is the location of the POM associated with the jar to install. GroupId, artifactId and version will be extracted from this file. [link] is a link to the jar to install, usually there should be a link to usr/share/java/$jar.jar and usr/share/java/$jar-$version.jar to comply with the Java packaging guidelines. Note that there is no need to specify those particular links if the --java-lib option is used. OPTIONS
-h --help: show this text -V --version: show the version -p<package> --package=<package>: package to act on -r<rules> --rules=<rules>: gives the location of the rules file for special properties. Optional, the default location is debian/maven.rules -c<classifier> --classifier=<classifier>: Optional, the classifier for the jar in the Maven repository. Empty by default. -v --verbose: show more information while running -n --no-act: don't actually do anything, just print the results Maven Repo Helper version 1.7.1 January 2012 MAVEN(1)