Rumaisa Niazi
Contributing since October, 2011
-
24articles
About Rumaisa Niazi
Rumaisa is a freelance writer at MUO. She has worn many hats, from a Mathematician to an Information Security enthusiast, and is now working as a SOC Analyst. Her interests include reading and writing about new technologies, Linux distributions, and anything around Information Security.
Latest Articles
What Is Internet Control Message Protocol (ICMP) & How Does It Work?
ICMP is a protocol to determine network availability and manage flow and error control at the network layer. But what does that mean in practice?
The Top 10 Vulnerability Scanning Tools
Want to improvise your company's vulnerability management policies? Here are some tools that can help you move forward.
How to Search for Packages in Ubuntu
Learn how to search for and find installed and uninstalled packages via the terminal and GUI tools in Ubuntu.
How to Set Up an Apache Web Server on Linux
Hosting a website on a Linux server doesn't have to be this hard. Not with Apache. Here's how you can install and configure an Apache server on Linux.
How to Install and Configure MySQL on Ubuntu
Want to set up your own relational database management system on Ubuntu? Consider installing MySQL database on the server.
The 8 Best Linux Distros for Chromebooks
Want to use Linux on your Chromebook? Check out these eight distributions that offer better features and enhanced performance than Chrome OS.
A Guide to MySQL for Beginners
Learn all the most important commands to start working with a MySQL database.
Introduction to Digital Signature Algorithm (DSA)
What is DSA, and how does it protect your data when you send it across the web?
TLS vs. SSL: What's the Difference & How Does It Work
These two encryption protocols are often talked about together, but what are they and how do they work?
The 9 Best Linux Network Troubleshooting Commands
Learn about the most commonly used tools to monitor and troubleshoot networks in Linux.
Linux Process Management: The Ultimate Guide
Improve system performance and security by learning about process management in Linux.
Handy Keyboard Shortcuts for the Linux Bash Terminal
Use these Linux Bash shortcuts for navigation, editing, command control, and easy access to history—all available in a free cheat sheet.
A Beginner's Guide to Metasploit in Kali Linux (With Practical Examples)
Learn about the basic interface and modules of Metasploit and how to use them to exploit MySQL vulnerabilities in Metasploitable 2.
9 Practical Examples of the cut Command in Linux
Become a Linux power user by learning how to manipulate text using the cut command.
How to Use hashcat to Crack Hashes on Linux
Cracking passwords is an important skill to learn if you're into penetration testing. Here's how you can crack hashes on Linux using hashcat.
5 Ways to Improve Linux User Account Security
Want to safeguard your Linux system against the various threats caused by unprotected user accounts? Here are some helpful tips to get started.
The 5 Most Useful Linux Text-Manipulation Commands
Want to up your Linux game and learn more about text-manipulation? Here are the top five Linux command-line tools to begin your journey.
How to Manage Linux Processes With htop
The top utility is a great system monitor, but htop is a fully interactive alternative that looks great too.
The Complete Guide to User Management in Linux
Managing users is a crucial task every Linux system administrator should be proficient in. Here's the ultimate user management guide for Linux.