Sometimes you just need to know where to start. That’s what this list represents to me. I had always thought of some list like this. Whether my creation or writing a critique of another’s list. I took the easy way out. I am going to review someone else’s list. For me, this is the list Read More …
Hacker Video – Exploiting Network Surveillance Cameras
Exploiting Network Surveillance Cameras Like a Hollywood Hacker
TLS: How It Protects Your Data Online
In today’s interconnected world, ensuring the security of data during online communication is essential. Transport Layer Security (TLS) is a foundational protocol that helps protect the privacy and integrity of data exchanged over the internet. This article will briefly explain what TLS is, how it works, and why it is critical for safe online communication. Read More …
DHCP and Its Role in Network Functionality
The Dynamic Host Configuration Protocol (DHCP) is an essential component of modern networking, ensuring that devices can seamlessly connect and communicate within a network. This article explores what DHCP is, why it is critical for networks to function efficiently, and how to configure basic DHCP settings on a home router. What is DHCP? DHCP stands Read More …
Backyard Chicken Jukebox -Day 192 – Greatest Hits of Yes
Backyard Chicken Jukebox -Day 192 – Greatest Hits of Yes We are working our way through the winter with Chickens for the first time. It has been quite an adventure, and some bitter cold days, have put our little flock to the test. Stay tuned for more videos about the hows and whats of a Read More …
Responsive Web Design
Definition 1 Responsive web design is the process of designing a mobile-friendly website that adapts depending on the visitor’s device–desktop, tablet, smartphone. Developers use CSS media queries to set breakpoints for each screen size so that users can browse a website within the constraints of their device. Definition 2 Responsive Web Design is an approach to Read More …
Hacker Video – Analyzing Meterpreter with Redline
A victim VM has been deliberately infected with Meterpreter via an IE exploit. The video shows copying over a Redline collector to extract forensic artifacts and save them to network share. The artifacts are then imported to an analysis workstation over sftp and opened in Redline. The analysis starts at the highest malicious score to Read More …
CPU :: The Brain of Your Computer
If a computer were a human body, the Central Processing Unit, or CPU, would be its brain. The CPU is one of the most critical components in any computer, responsible for carrying out instructions and ensuring everything works together smoothly. Let’s explore what the CPU is, what it does, and how it functions in a Read More …
Hacker Video – Intro to Hacking Web Apps
Assessing the security posture of a web application is a common project for a penetration tester and a good skill for developers to know. In this talk, I’ll go over the different stages of a web application pen test, from start to finish. We’ll start with tools used during the discovery phase to utilize OSINT Read More …