Welcome to this week’s newsletter. The curated information comes from books, podcasts, articles and documentaries. Think of this newsletter as content curation as a service.
What is Ransomware? Ransomware is malicious software that denies a user access to his or her files and demands a ransom in order for the…
Welcome to this week’s newsletter. The curated information comes from books, podcasts, articles and documentaries. Think of this newsletter as content curation as a service.
Welcome to this week’s newsletter. The curated information comes from books, podcasts, articles and documentaries. Think of this newsletter as content curation as a service.
Metasploitable3 is a free virtual machine that allows you to simulate cyber attacks in a safe environment. It is developed by Rapid7. You can use…
Let’s view ego as a king. A self righteous king . One who believes that they can do no wrong. A king who believes that…
I came across a report by IEEE about the most wanted programming skills in 2018. The report was based on data from an online job-search…
By the end of this article you’ll know: How to customize your virtual machine to your liking and how to access the vagrant machine through…
Introduction About a year ago I was challenged by someone in a WhatsApp group to tackle a very interesting CTF. What I can say is…
WHAT ARE VIRTUAL MACHINES? A virtual machine is a computer file, an image, that through the use of a virtualization software can be used to…