Processing data on Linux is really simple. Many commands are available for all kinds of text-processing functions. We’ve seen some of these commands in the previous chapter, but their number […]
Hi there! This is A. Boukar. I share on this blog all kinds of stuff related to cybersecurity and pentesting. I try to post new content each week, so if you want to be kept posted, make sure to subscribe to my newsletter, or you can follow me on my Medium page, where I share most of my articles.
– A. Boukar