MakeUseOf

Rumaisa Niazi-

Rumaisa Niazi

About Rumaisa Niazi

Rumaisa is a freelance writer at MUO. She has worn many hats, from a Mathematician to an Information Security enthusiast, and is now working as a SOC Analyst. Her interests include reading and writing about new technologies, Linux distributions, and anything around Information Security.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Network 1
What Is Internet Control Message Protocol (ICMP) & How Does It Work?

ICMP is a protocol to determine network availability and manage flow and error control at the network layer. But what does that mean in practice?

Securing Loopholes 1
The Top 10 Vulnerability Scanning Tools

Want to improvise your company's vulnerability management policies? Here are some tools that can help you move forward.

searching package names on linux 1
How to Search for Packages in Ubuntu

Learn how to search for and find installed and uninstalled packages via the terminal and GUI tools in Ubuntu.

installing apache server linux 1
How to Set Up an Apache Web Server on Linux

Hosting a website on a Linux server doesn't have to be this hard. Not with Apache. Here's how you can install and configure an Apache server on Linux.

Database written on a board 1
How to Install and Configure MySQL on Ubuntu

Want to set up your own relational database management system on Ubuntu? Consider installing MySQL database on the server.

Chromebook 1
The 8 Best Linux Distros for Chromebooks

Want to use Linux on your Chromebook? Check out these eight distributions that offer better features and enhanced performance than Chrome OS.

A diagram showing a laptop connected to two boxes representing servers 1
A Guide to MySQL for Beginners

Learn all the most important commands to start working with a MySQL database.

Digital Signature 1
Introduction to Digital Signature Algorithm (DSA)

What is DSA, and how does it protect your data when you send it across the web?

TLS SSL Website Security 1
TLS vs. SSL: What's the Difference & How Does It Work

These two encryption protocols are often talked about together, but what are they and how do they work?

woman with laptop working 1
9 Advanced MySQL Security Tips

Secure your MySQL database server by following these easy tips.

linux network troubleshooting commands 1
The 9 Best Linux Network Troubleshooting Commands

Learn about the most commonly used tools to monitor and troubleshoot networks in Linux.

System-Monitoring 1
Linux Process Management: The Ultimate Guide

Improve system performance and security by learning about process management in Linux.

person pressing keys on keyboard 1
Handy Keyboard Shortcuts for the Linux Bash Terminal

Use these Linux Bash shortcuts for navigation, editing, command control, and easy access to history—all available in a free cheat sheet.

Code 1
A Beginner's Guide to Metasploit in Kali Linux (With Practical Examples)

Learn about the basic interface and modules of Metasploit and how to use them to exploit MySQL vulnerabilities in Metasploitable 2.

cut command in linux 1
9 Practical Examples of the cut Command in Linux

Become a Linux power user by learning how to manipulate text using the cut command.

crack hashes on linux with hashcat 1
How to Use hashcat to Crack Hashes on Linux

Cracking passwords is an important skill to learn if you're into penetration testing. Here's how you can crack hashes on Linux using hashcat.

Pointer hovering over the word  1
5 Ways to Improve Linux User Account Security

Want to safeguard your Linux system against the various threats caused by unprotected user accounts? Here are some helpful tips to get started.

best linux text manipulation commands 1
The 5 Most Useful Linux Text-Manipulation Commands

Want to up your Linux game and learn more about text-manipulation? Here are the top five Linux command-line tools to begin your journey.

htop interface showing a list of running processes with pid, user, and resource details 1
How to Manage Linux Processes With htop

The top utility is a great system monitor, but htop is a fully interactive alternative that looks great too.

user account management on linux 1
The Complete Guide to User Management in Linux

Managing users is a crucial task every Linux system administrator should be proficient in. Here's the ultimate user management guide for Linux.

1 2
Page 1 / 2