BLOG

Latest Articles

Automate SSH Brute Force Attack [4 Methods]

SSH brute force attacks are a type of cyber attack that is becoming increasingly common. They involve the use of automated software to try and gain access to

By kennedymuthii · 5 min read · Ethical hacking

Convert CentOS 8 to Rocky Linux 8 [100% Working]

As you know, CentOS Linux 8 became the end of life on 31 Dec 2021. It will now continue its life as CentOS Stream 8. Many people/organizations using CentOS

By omercakmak · 5 min read · Rocky Linux

PROPERLY disable IPv6 in Rocky Linux [SOLVED]

IPv6(128-bit address) is a protocol that will replace the IPv4(32-bit address) network protocol and provide a much larger network address space usage. It is

By omercakmak · 5 min read · Rocky Linux

How to install PostgreSQL Rocky Linux? [SOLVED]

Step by step instructions to install postgresql from default repository or from online archive. You can download and install custom postgresql version from …

By omercakmak · 4 min read · Rocky Linux