Skip to content

CyberPratibha

A free blog for information

  • Home
  • FREE COURSES
    • Ethical Hacking Tutorial
    • Linux Tutorial for Beginners
    • Website Devlopment
    • WordPress Tutorial
  • Categories
    • Linux
      • Kali Linux
        • Basics
        • Password Attack
      • Ubuntu 14.04
      • BackBox Linux
      • Fedora 20
    • Security Tools
      • Metasploit Guide
      • Password Cracking
      • Stegnography
      • Wifi Password tools
    • Windows 10
      • Tips and Tricks
      • News
  • Best VPN Offer
    • 7 Best VPN Over All
    • 7 Best VPN for Windows 10
    • 7 Best VPN for Android
    • Best VPN for MAC
    • 7 Best VPN for Torrenting
    • Best VPN Offers 2022
    • Ultimate VPN Guide

CyberPratibha

A free blog for information

  • Home
  • FREE COURSES
    • Ethical Hacking Tutorial
    • Linux Tutorial for Beginners
    • Website Devlopment
    • WordPress Tutorial
  • Categories
    • Linux
      • Kali Linux
        • Basics
        • Password Attack
      • Ubuntu 14.04
      • BackBox Linux
      • Fedora 20
    • Security Tools
      • Metasploit Guide
      • Password Cracking
      • Stegnography
      • Wifi Password tools
    • Windows 10
      • Tips and Tricks
      • News
  • Best VPN Offer
    • 7 Best VPN Over All
    • 7 Best VPN for Windows 10
    • 7 Best VPN for Android
    • Best VPN for MAC
    • 7 Best VPN for Torrenting
    • Best VPN Offers 2022
    • Ultimate VPN Guide

CyberPratibha

A free blog for information

Month: April 2019

Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label
April 20, 2019May 1, 2019Linux Tutorial for Beginners - only

fstab Mount nfs Filesystem and Unmount in Linux [Step by Step Tutorial]

  fstab Mount nfs Filesystem in Linux In the last video we […]

17 Extend existing logical volumes
April 19, 2019May 1, 2019Linux Tutorial for Beginners - only

How to extend logical volume in Linux [Video Tutorial]

  Extend logical volume, It is unencrypted: Hello friends, It is the […]

18 Create and configure set-GID directories for collaboration
April 18, 2019May 1, 2019Linux Tutorial for Beginners - only

Create and configure set GID directories for collaboration

  Create and configure set GID directories for collaboration Hello friends! It’s […]

19 Create and manage Access Control Lists (ACLs)
April 17, 2019May 1, 2019Linux Tutorial for Beginners - only

Create and manage Access Control List (ACL)

  Create and manage Access Control List (ACL) I will cover the […]

21 Create, delete, and modify local user accounts
April 16, 2019May 1, 2019Linux Tutorial for Beginners - only

adduser and useradd command in Linux – Manage Linux user account

  Manage Linux user account – adduser and useradd command in Linux […]

22 Change passwords and adjust password aging for local user accounts
April 15, 2019May 1, 2019Linux Tutorial for Beginners - only

How to Change root user password in Linux redhat CentOS 7

  How to Change root user password in Linux – Change root […]

23 Create, delete, and modify local groups and group memberships
April 14, 2019May 1, 2019Linux Tutorial for Beginners - only

23 Create, delete, and modify local groups and group memberships

Linux tutorial for Beginners – Manage Users and Groups Create, delete, and […]

24 Configure a system to use an existing LDAP directory service for user and group information
April 11, 2019May 1, 2019Linux Tutorial for Beginners - only

Install and uninstall packages by rpm command in linux

  RPM command in Linux for Install packages and update software packages. […]

25 Install and update software packages by using rpm command
April 10, 2019May 1, 2019Linux Tutorial for Beginners - only

Install software packages by using yum install command in Linux

  Install and update software packages by using yum install command in […]

How to encrypt files and folders in W
April 10, 2019August 4, 2021module 9 Data Protection

How to encrypt files and folders by EFS Windows 10

This article will cover What is encrypted file system and Encrypt files […]

Posts navigation

Previous 1 2 3 Next
course details

FREE Upcoming Training

  • Website Development Without Coding
  • RHCSA RedHat Server Administrator
  • Kali Linux Tutorial (Hacking Operating System)
  • Ethical Hacking Tutorial
  • Ubuntu Linux Tutorial

Subscribe Our Channel

Recent Posts

  • Cybersecurity Risks That Can Potentially Threaten Your Business
  • Fiber Optic Vs Cable Internet: 7 Key Differences & the Better Option for Your Business
  • The Best Web Hosting For Small Business, Know pros and cons 2022
  • 3D Secure Authentication In A Nutshell
  • How to Choose Best VPN Services or Best VPN Connection

Hacking Tools

TOP Free Hacking Tools 

Top 5 Wifi Hacking software 

Top 5 hidden spy apps for android and Iphone

Top10 Free Steganography Tools

Ethical Hacking Tutorial – Free

    Protect your Privacy

    Top 7 Best VPN 2022

    7 Best VPN for Windows

    7 Best VPN for Android

    Best VPN for MAC

    7 Best VPN for Torrenting

    VPN Offers March 2022

    Website Development

    Develop a Website for Small Business

    How to Start a Blog and Make Money

    How To Start Online Business

    Inexpensive & Reliable WordPress Hosting

    Best Web Hosting For Small Business

      Ethical Hacking Important

      Ethical Hacking Career in India

      Why Pursue a Career in Ethical Hacking

      How to Become Hacker Free

      How to become Kali Linux Hacker

      How do you access the Dark Web Safely

        © 2022 CyberPratibha. Proudly powered by Sydney

        WhatsApp us

        Go to mobile version