Skip to main content

דברים שכדאי לדעת כול מה שקשור ל תוכניות

programs:

apt-get install kde הוספת האינטר פאסי של קאדי אל המערכת
apt-get install ddns3 -client תכנית לשמירת די אנ איס דינאמי לא משתנה
apt-get install myspell-he הוספת בודק כתיב ל פאיר פוקס
apt-cach search PackageName חיפוש חבילה מסוימת
apt-get install PackageName הורדה של תכנית מסוימת עם התקנה
apt-get install -d PackageName הורדה שלתכנית מסוימת בלי התקנה
apt-cache search PackageName | grep SerchFor חיפוש עם סינון לפי שם מסוים
apt-get update אחרי עדכון רשימת השרתים של התכניות, עדכון רשימת התכניות במחשב
apt-cdrom add -d=/media/cdrom עדכון רשימת התכניות מ דיסק
apt-get remove PackageName הסרה של חבילה
apt-get -–purge remove PackageName הסרה של חבילה+מכור
whereis PackageName מחזיר את הכתובת של החבילה ב מערכת
/var/www/apache2-default/ תיקיית השרת של ה אבאתשי
/etc/init.d/apache2 stop עצירת שרת ה אבאתשי
apt-get install ksmserver תכנת לשליחת אס אמ איס
apt-get remove apache* ימחק כול מה שקשור עם השם ההתחלתי
apt-get install pptp-linux להוסיף אתה באב סיקריט למערכת לחבור אינטרנט ביתי
apt-get install mozilla-noscript הוספת פלאש ל דפדיפאן
sh Filename בקדת הפעלת ההתקנה ל באקי"ג מסויאם
apt-get install xpdf רוצה להפוך את קובץ ה בדף לא מצליח כאן יש את הפתרון
apt-get install k3b צריבת דיסקים וכול מה שקשור לצריבה
apt-get install GStreamer.... קודיקים של ה וידיו

Comments

Anonymous said…
ממש עוזר תודה ..

Popular posts from this blog

ESP32-C6 Wi-Fi Logger with Browser GPS + Heat Map Dashboard

This project is an ESP-IDF firmware for the Seeed Studio XIAO ESP32-C6 that turns the board into a self-hosted, secure Wi-Fi scanning logger. It creates its own access point, serves a responsive HTTPS web UI, logs nearby Wi-Fi access points, optionally tags rows with GPS coordinates (provided by the client browser), and exposes battery status from the on-board LiPo input. The end result is a pocket Wi-Fi “survey” tool: scan, track, export logs as CSV, and generate a heat map view to visualize RSSI vs location. Project overview and feature set: :contentReference[oaicite:1]{index=1} What it does AP + Station mode so the device can serve the dashboard while scanning nearby Wi-Fi networks. HTTPS web interface using a bundled certificate/key for local secure access. Single scan and continuous tracking modes. CSV export for analysis and archiving. Persistent logging to SPIFFS at /spiffs/logs.csv . Battery monitoring via ADC with voltage/percentage/status sh...

learn how to sniff wireless passwords with pirni

The thing about the iPod Touch and the iPhone is that they are great portable hacking devices. To the naked eye the iPod Touch/iPhone looks like nothing more than an ordinary mp3 player/cellphone however that is just an understatement to its full potential. Once your Ipod Touch/iPhone is jailbroken you have access to your whole file system meaning that applications generally associated with laptop/desktop hacking can be ported and used on the iPod Touch/iPhone. This opens up a whole lot of possibilities for network sniffing, port scanning and much much more! In this tutorial we are going to take a look at one of these programs called Pirni. What is Pirni? Pirni is an application that was ported to The Ipod Touch/iPhone to be used as a native network sniffer. Pirni is so useful because it gets past the iPod Touch’s/iPhone’s wifi hardware limitation of not being able to be set into promiscious mode (a mode that allows a network device to intercept and read each network packet that arrive...

Performance Monitoring

Performance Monitoring "System Accounting," teaches about the UNIX accounting system, and the tools that the accounting system provides. Some of these utilities and reports give you information about system utilization and performance. Some of these can be used when investigating performance problems. In this portion of the book, you will learn all about performance monitoring. There are a series of commands that enable system administrators, programmers, and users to examine each of the resources that a UNIX system uses. By examining these resources you can determine if the system is operating properly or poorly. More important than the commands themselves, you will also learn strategies and procedures that can be used to search for performance problems. Armed with both the commands and the overall methodologies with which to use them, you will understand the factors that are affecting system performance, and what can be done to optimize them so that the system performs...