Description After struggling to secure our secret strings for a long time, we finally figured out the solution to our problem: Make decompilation harder. It should now be impossible to figure o...
I have a new avatar! My new avatar The thruth is that I have a new whole collection of avatars thanks to my friend Miguel Sislian. Miguel is an artist, a hacktivist and currently is working as a...
Learn how to configure a firewall with iptables from scratch. Protect your Linux systems from attacks with this essential, basic configuration guide. This guide covers syntax, commands, best prac...
Sometimes we found ourselves in the need of connect from, or to, old devices. With the passage of time it may that these devices and/or their applications became non upgradeable. Meanwhile, SSH kee...
Nowadays, in times when malware proliferates, who isn’t worried about clicking by mistake (or not) on a malicious link? It’s more, who isn’t worried about a family member or friend, with less compu...
If you use Chrome, and if you have Google Chrome version 115, you will have seen a new notice regarding privacy: “Enhanced ad privacy in Chrome”. According to Google: Chrome works to keep you ...
Completed Web Requests Completed Web Requests achievement
Completed Introduction to Networking Completed Introduction to Networking achievement
Sometimes we don’t like default named directories as “Desktop” or “Downloads” and we prefer lowercase namings as “desktop” or “downloads”, name them in another language, or, simply, give them anoth...
HMV Principle Lastly I’ve been acting (gladly) as beta tester for my friend Kaian. Kaian did the Principle box for HackMyVm and I was one of the chosen to test it. It was a very fun machine and i...