GNOME Shell Extensions that Improve the Interface

We have GNOME 3.0 now and it introduced a new overview mode. Now you can launch apps, switch between windows, and also...

How to know victim’s OS using Nmap

Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for...

ARP: Address Resolution Protocol

ARP stands for Address Resolution Protocol. ARP is a protocol by which we find out the layer 2 address...

Internet Control Message Protocol

There are so many protocols out there in the computer networks world which focus on the QoS and improving...

32-bit And 64-bit Smartphones ?

Smartphones with 32-bit and 64-bit processors aren’t a new thing, they have been around for a few years now.
Tips N Tricks, Tutorial
GNOME Shell Extensions that Improve the Interface
Ethical Hacking Tutorials, Tutorial
How to know victim’s OS using Nmap
Networking, Technology
ARP: Address Resolution Protocol
Networking, Technology
Internet Control Message Protocol
Gadgets - Android | IOS, Technology
32-bit And 64-bit Smartphones ?

Trending Gadgets

The concept of gadgets have shaped our life with meaning of this technological world.

 

Hi to everyone.
Welcome to NetNeek!

NetNeek is an emerging network of most recent tech news with an attention on cloud platform, advancement controls in mix of tutorial guides, online business bargains, ethical hacking and more.

Read more
Technology

Technology category

Coming from the
advanced generation has
been processed us
how we’ve approached
our own technical process.

Read more
Tips N Tricks, Tutorial

GNOME Shell Extensions that Improve the Interface

We have GNOME 3.0 now and it introduced a new overview mode. Now you can launch apps, switch between windows, and also managed virtual desktops. I loved it, and GNOME easily became my favorite desktop environment on any OS. But there are a few changes I would like to make and I can, this is one of the greatest about GNOME. You can change things to to your choice if you don’t like the default experience.

Continue reading

Ethical Hacking Tutorials, Tutorial

How to know victim’s OS using Nmap

Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts.

Continue reading

Networking, Technology

IPv4 & IPv6

The Internet has run out of Internet addresses or will soon get exhausted.  IPv4’s successor is IPv6, a system that will not only offer far more numerical addresses, but will simplify address assignments and additional network security features.

Continue reading

Business News, Digital Deals

What Is Bitcoin Gold? Why Is Bitcoin Splitting For The Second Time?

Earlier this year in August, we witnessed the splitting of Bitcoin as a result of the formation of a new hard fork named Bitcoin Cash (BCC). Compared to the pre-existing Bitcoin, BCC stressed on high speed and volume of transaction. It also increased the block size to 8MB and removed SegWit2x proposal.Now, Bitcoin is on its way to being forked into another digital currency named Bitcoin Gold. So, let’s answer some of the popular queries which are confusing the cryptocurrency enthusiasts:

Continue reading

Popular posts

SQL Injection Full Tutorial With Step-Wise Guide

SQL injection is a code injection technique, used to attack data-driven applications, in which nefariousSQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).

An Introduction to Docker and it’s Containers

Docker is a tool designed to make it easier to create, deploy, and run application by using containers. Containers allow a developer to package up an applications with all of the parts...