Since I am studying IT security, I am constantly learning a lot of incredible insights into the technical aspects of it. But, most surprising, there…
A blog about IT, security and whatever crosses my mind.
Since I am studying IT security, I am constantly learning a lot of incredible insights into the technical aspects of it. But, most surprising, there…
Given the recent debates about secure and encrypted communication, it might be interesting to understand why most mobile messenger apps do not exactly allow anonymous communication and what possibilities exist to enable it.
I do not read books very often and when I do, I tend to do it in a day or two. In 2016 I read…
This week I learned about Unix file permissions and realized that I did not know anything about it. But apparently, it is not that difficult…
Last week I had to write an [tooltip tip=”Network Time Protocol”]NTP[/tooltip] spoofer for a hacking course. The main goal was to manipulate [tooltip tip=”Network Time…
I started to use Docker for different purposes, ranging from development to uses where a virtual machine is overkill. Lately, I have played around with…
In the last few weeks I have been looking for some paid projects to earn some extra money. I stumbled across a lot of requests…
I got this idea today after using DuckDuckGo for a while to create QR codes. If you are using DuckDuckGo as your search engine, you…
Being able to connect to your Raspberry Pi through WiFi and either extend your home network or have a direct connection with your Pi is…
Linux offers a lot of packages and programs to back up your files. Since I just migrated to Linux, I had to leave my previous…