-
1by Gunawan, Teddy Surya, Lim, Muhammad Kasim, Zulkurnain, Nurul Fariza, Kartiwi, Mira“… analysis, and security audit. On the other hand, Kali Linux is the most popular penetration testing…”
Published 2018
Get full text
Get full text
Get full text
Get full text
Get full text
-
2“… attacks and will be further investigated in this paper. Kali Linux provides a great platform and medium…”
Get full text
Get full text
Get full text
Get full text
Get full text
-
3“…This research introduces a virtual interface between Windows 7 and LINUX Fedora 16 based…”
Get full text
Get full text
Get full text
Get full text
-
4by Akmeliawati, Rini, Bailey, Donald, Bilal, Sara Mohammed Osman Saleh, Demidenko, Serge, Gamage, Nuwan, Khan , Shujjat, Ye, Chow Kuang, Ooi, Melani, Gupta, Gourab Sen“… implementation of the system with the use of Windows7 and LINUX Fedora 16 operating systems with VMware…”
Published 2014
Get full text
Get full text
Get full text
Get full text
-
5by Ali, Mahamat Mahamat, Habaebi, Mohamed Hadi, bin Aliasaa, Nazrul Arif, Islam, Md. Rafiqul, Hameed, Shihab A.“… programming boards with transmitter and receiver antennas, and interfaced using TinyOS software on Linux. Our…”
Published 2015
Get full text
Get full text
Get full text
-
6by Ahmed, Muhammed Zaharadeen, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Abdulkadir, H Alkali, Midi, Nur Shahida, Abd. Rahman, Faridah“… mobile router. Simulation analysis was carried out using ndnSIM 2.1 on Linux Version 16.1. we build…”
Published 2019
Get full text
Get full text
Get full text
Get full text
Get full text
-
7“… was developed namely Evaluative AP Selection which used LINUX Bash script programming whilst the internet…”
Get full text
Get full text
Get full text
Get full text
-
8by Abdul Aziz, Siti Rahayu, Endut, Nor Adora, Abdullah, Shapina, Mior Daud, Mior Norazman“… and average end-to-end delay. This project used Linux as an operating system based platform and discrete event…”
Published 2008
Get full text
Get full text
-
9“… computer cluster network in a master-slave model. In this paper we report the development of a LINUX…”
Get full text
Get full text