Computer Cool Tricks

Act like you know.

  • Tech Blog

    • Win FAQ
    • Linux
  • Cyber Security

  • Termux

  • Privacy Policy

  • Cookies policy

  • More

    Use tab to navigate through the menu items.
    • All Posts
    • Win FAQ
    • Termux
    • Linux
    • Cyber Security
    Search
    How we can setup VPN in Linux environment? | Computercooltricks
    Rahul
    • Nov 21, 2021
    • 3 min

    How we can setup VPN in Linux environment? | Computercooltricks

    Virtual Private Network ‘VPN‘ is a secure network connection that establishes an encrypted connection while sending and receiving data on...
    1,877 views0 comments
    Network scan by using Linux base operating system |computercooltricks
    Rahul
    • Feb 23, 2021
    • 3 min

    Network scan by using Linux base operating system |computercooltricks

    There are lots of several tools available for scanning the network in Linux based platform. In this blog, I am going to show you how to...
    64 views0 comments
    What to do after installing the CentOS | Computercooltricks
    Rahul
    • Feb 15, 2021
    • 3 min

    What to do after installing the CentOS | Computercooltricks

    CentOS is a community-driven free-based distribution and most important CentOS is the capable alternative to Red Hat Enterprise Linux....
    69 views0 comments
    How to enable Hibernate in Linux?| | Computercooltricks |
    Rakhi Kundu
    • Feb 11, 2021
    • 2 min

    How to enable Hibernate in Linux?| | Computercooltricks |

    What is Hibernate? Hibernate is a feature that gives you to save your systems state immediately your hard - disk so that we switch back...
    114 views0 comments
    Port Scanning with Unicornscan.
    -
    • Jan 5, 2021
    • 2 min

    Port Scanning with Unicornscan.

    We can use Unicornscan for information gathering purpose along with for port scanning. Unicornscan has the following features:...
    433 views0 comments
    SHODAN for Penetration | Computercooltricks | Darkworldhacker
    -
    • Jan 5, 2021
    • 4 min

    SHODAN for Penetration | Computercooltricks | Darkworldhacker

    Shodan is a scanner which reveals devices related over the internet. Shodan can finds gadgets like traffic lights, protection cameras,...
    49 views0 comments
    ISPY: Exploiting EternalBlue And BlueKeep  | Computercooltricks
    -
    • Jan 5, 2021
    • 1 min

    ISPY: Exploiting EternalBlue And BlueKeep | Computercooltricks

    What is eternalblue: EternalBlue could be a cyberattack exploit developed by the U.S. National Security Agency (NSA) per testimony by...
    89 views0 comments
    How to set GIFas wallpaper?

    How to set GIFas wallpaper?

    3390
    Useful commands for System Administrator or Network Administrator | Computercooltricks |Darkworld

    Useful commands for System Administrator or Network Administrator | Computercooltricks |Darkworld

    2320
    Types of Network Topologies

    Types of Network Topologies

    1940
    logo-01 (1).jpg

    Tech Talk

    A BLOG BY Dr. Tech 

    E: darkworldtech@gmail.com

    WEEKLY NEWSLETTER 

    Thanks for submitting!

    • YouTube

    © 2023 BY Dr. Tech