What is Data Compression and What Role Did it Play in the libwebp Cellphone Attack?
Use Code jjt8vpmput1d for 35% off during our Cyberweek !
Linux Firewalls: The Modern NFTable Firewall
Python Basics: Programming Concepts
Getting Started with PGP for email
Remaining Anonymous: Getting Started with Tails
Radio Basics for Hackers, Part 2: Amplitude, Modulation, decibels and gain
Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems
Networking Basics for Hackers, Part 1
Linux Basics for Hackers, Part 14: Using the curl command to Download Web Site Source Code
Linux Firewalls: Creating an Application Layer IDS/IPS with fwsnort
Linux Basics for Hackers, Part 13: Running Kali Linux in Windows (WSL)
Linux Basics for Hackers, Part 12: The Linux Philosophy
Linux Firewalls: Uncomplicated Firewall (ufw)
Linux Basics for the Aspiring Hacker, Part 3 (Creating, Removing and Renaming Files and Directories)
Linux Basics for Hackers, Part 11: Linux Firewalls (iptables)