How to process email attachments automatically on Linux

I will share my experience that I had get through while trying to find a way to process an attachment from my personal email using Linux bash scripting. To start with the story I purchased a daily proxy feed from Hidemy*** which I wanted to feed to our proxy software E-bouncer. The down side is that Hidemy*** will only send you the list as an attachment on your...

Read More
Make use of Digital Ocean and Vultr VPS API with PHP wrapper

Here is my first experience with api wrapper. Digital Ocean and Vultr provides vps services so if you don’t want to log into their panel each time you want to perform an action to the vps node you can call the droplets functions from your own website and have your own control panel. First you will need to create your own client ID and key both can be...

Read More
The art of port forwarding on Linux

In order to be stealth and jump from node to another to cover up your movements sometimes you will need to use port forwarding. Why in Linux because its stable and you have many options that you don’t get on windows.       There are many tools out there but we have picked the ones we have tried as explained below: Rinetd Score:3/10...

Read More
Setup your machine as a coin miner and generate virtual currency

They are many virtual currencies that can be mined using CPU or GPU. If you are having a server or a PC that you would utilities to generate passive income then here is a small guide that I have prepared to simplify it. I will show you how to set it up in different OS environments Linux (CentOS – Ubuntu) and Windows 7 which should be pretty much the same...

Read More
Mitigating the Beast, Heartbleed, DROWN and POODLE attack attack on SSL TLS grade A+

SSL is the technology used to encrypt and decrypt messages sent between the browser and server. By encrypting the data, you protect messages from being read while they are transferred across the Internet. encrypts a message from the web browser, or application then sends it to the server. When the message is received by the server, decrypts it and verifies that...

Read More
  1. Pages:
  2. 1
  3. 2
  4. 3
  5. 4
  6. 5

Pin It on Pinterest