Tutorials

Packt Hub will keep you up to date with the latest tech with our FREE bite-sized tutorials. We provide coverage across a variety of languages and tools, including Python, Java, and Angular.

Discovering network hosts with ‘TCP SYN’ and ‘TCP ACK’ ping scans in Nmap[Tutorial]

0
Ping scans are used for detecting live hosts in networks. Nmap's default ping scan (-sP) sends TCP SYN, TCP ACK, and ICMP packets to...

Brute forcing HTTP applications and web applications using Nmap [Tutorial]

0
Many home routers, IP webcams, and web applications still rely on HTTP authentication these days, and we, as system administrators or penetration testers, need...

Google Forms for Multiple Choice and Fill-in-the-blank Assignments

0
In this article by Michael Zhang, the author of the book Teaching with Google Classroom, we will see how to create multiple choice and...

Squid Proxy Server: Fine Tuning to Achieve Better Performance

0
  Squid Proxy Server 3.1: Beginner's Guide Improve the performance of your network using the caching and access control capabilities of Squid         Read more about this book       Whether...
DL4J 1.0.0-beta4

Best practices for RESTful web services : Naming conventions and API Versioning [Tutorial]

0
This article covers two important best practices for REST and RESTful APIs: Naming conventions and API Versioning. This article is taken from the book Hands-On RESTful...
Electron Fiddle

How to create a desktop application with Electron [Tutorial]

0
Electron is an open source framework, created by GitHub, that lets you develop desktop executables that bring together Node and Chrome to provide a full GUI experience. Electron has been used...

Creating a simple GameManager using Unity3D

1
Using the so called "Game Managers" in games is just as common as eating when making games. Probably every game made has their natural...

The Design Documentation

0
(For more resources related to this topic, see here.) The design documentation provides written documentation of the design factors and the choices the architect has...
digital forensics

Getting started with Digital forensics using Autopsy

0
Digital forensics involves the preservation, acquisition, documentation, analysis, and interpretation of evidence from various storage media types. It is not only limited to laptops,...

How to attack an infrastructure using VoIP exploitation [Tutorial]

0
Voice over IP (VoIP) is pushing business communications to a new level of efficiency and productivity. VoIP-based systems are facing security risks on a daily basis. Although...

Popular on Packt Hub