• 1) /etc/hosts
  • 2) Search hosts
  • 3) Statistics
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet184/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   180   181   182   183   184   185   186   187   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    What is Routing?
    Routing is a network protocol system that sends packets in a definite way so
    that the time that takes to transfer the packets reduces. When a lot of
    packets are being sent it usually takes a lot of time and can result in less
    network bandwidth. For this reason, efficient routing protocols are being
    developed for better transportation of packets. 
    For this, we need to create a routing table and should calculate for the flags
    that may be present in the network system.
    In the next section, we will discuss network hosts in detail. Follow along! 
    1) /etc/hosts
    In the early worlds of computing people used to enter the IP address to send
    or receive any information from the system. But after the successful
    introduction of the host system, it is no longer used. The host is just a text
    interpretation of the manual input address. 
    There is a host file that is present in the etc folder where all the DNS
    profiles can be added. Nowadays this is usually made by google DNS
    server which consists of every web address. Also, hosts can be used to
    know about the number of packets transmitted. 
    We now discuss here the hosts' directory and give some commands: 
    2) Search hosts
    In this option, we can use a command to search any name server that is
    present in the DNS profile. When we use this tool, we will get the input
    address of the website we are searching for. This will help us to find other
    important fingerprinting technologies. 
    Below is the command to find the hosts that are present: 


    example@ linuxwar : search host 23.1.12.1
    3) Statistics
    Statistics that are present can be used to display the host information. Hosts
    are very important for a successful connection to the server. You can use
    various tools that can help us deal with these functionalities. 
    Apart from using it is a network tool hosts are very favorite of software
    crackers. Usually, when the software is reverse engineered and cracked by
    hackers it will have an ability to connect to the internet and redo everything.
    This is where hackers make use of host profiles. They will add a line of
    code in the hosts' files to redirect the software to the localhost. With this, if
    there is any interruption of services that will be regained. 
    In the next section, we will discuss one of the most important and easily
    used network tools that are ping.

    Download 6,34 Mb.
    1   ...   180   181   182   183   184   185   186   187   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish