• 15) File Compression
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet160/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   156   157   158   159   160   161   162   163   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    c) Find the execution file
    Execution files are special installation files that are used to make programs
    run for the first time. Windows use this extensively but Linux can also run


    them with certain software. You can also search execution files in Linux
    with a command called. This will display the path of the system file. 
    Below is the command example for this:
    vulnerhost @ example: exec demon.ex e
    In the next section, we will discuss in detail about compression
    technologies present in Linux. Let us go!
    15) File Compression
    Users use compression technologies to reduce the file size. Compressed
    files can also be encrypted easily to store sensitive information and can be
    opened with only a password. Winrar is the most famous compression
    utility present in windows. However, Linux is open source and uses other
    software's which we will explain below in detail. 
    a) gzip
    The usage of gzip is pretty simple and straightforward. All we need to do is
    enter the following set of commands with the file name we are trying to
    compress. This utility is mainly used to compress configuration files as it is
    good at making a set of small files into a compressed package fastly. Below
    are the commands: 
    vulnerhost @ example: gzip start beatles.mp3
    file compressed successfully
    b)tar
    Tar is another famous compression utility tool that is very famous in Linux.
    It also works as gzip utility but has additional integration capabilities that
    gzip doesn't offer. The best thing about tar is it compressed and integrates at
    the same time. Thus, for hackers who are trying to exploit and compress a
    lot of files at the same time, this is the best choice. Below we will give
    some commands that will help us understand how it functions. Take a look
    at it: 


    vulnerhost @ example: tar start beatles.avi
    file compressed successfully
    By this, we have completed a brief overview of various file management
    system concepts in Linux. In the next section, we will discuss process
    management in detail. It is obvious by now that Linux runs by processes.
    Learning about the process can help us work more efficiently. Let's dive
    into it in detail.

    Download 6,34 Mb.
    1   ...   156   157   158   159   160   161   162   163   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish