Sometimes, during cyber security challenges or ethical hacking tasks, you may need to find the IP address of an inactive computer or one that has not been logged in.
Category: Linux
Linux maintainers were infected for 2 years by SSH-dwelling backdoor with huge reach | Ars Technica
https://arstechnica.com/security/2024/05/ssh-backdoor-has-infected-400000-linux-servers-over-15-years-and-keeps-on-spreading/2/
7 Linux networking commands that every sysadmin should know | Enable Sysadmin
https://www.redhat.com/sysadmin/7-great-network-commands
9 network commands every Linux admin should know – TechRepublic
https://www.techrepublic.com/article/9-network-commands-every-linux-admin-should-know/
3 command line games for learning Bash the fun way | Opensource.com
https://opensource.com/article/19/10/learn-bash-command-line-games
3 command line games for learning Bash the fun way | Opensource.com
https://opensource.com/article/19/10/learn-bash-command-line-games