All our computers should be using a firewall. Especially those that expose services to the internet. Firewalls are crucial for mantaining the security of our network and protecting our data from e...
Sometimes we found ourselves in the need of connect from, or to, old devices. With the passage of time it may that these devices and/or their applications became non upgradeable. Meanwhile, SSH kee...
Nowadays, in times when malware proliferates, who isn’t worried about clicking by mistake (or not) on a malicious link? It’s more, who isn’t worried about a family member or friend, with less compu...
If you use Chrome, and if you have Google Chrome version 115, you will have seen a new notice regarding privacy: “Enhanced ad privacy in Chrome”. According to Google: Chrome works to keep you ...
Completed Web Requests Completed Web Requests achievement
Completed Introduction to Networking Completed Introduction to Networking achievement
Sometimes we don’t like default named directories as “Desktop” or “Downloads” and we prefer lowercase namings as “desktop” or “downloads”, name them in another language, or, simply, give them anoth...
HMV Principle Lastly I’ve been acting (gladly) as beta tester for my friend Kaian. Kaian did the Principle box for HackMyVm and I was one of the chosen to test it. It was a very fun machine and i...
Getting started In this article we are going to assume the folling ip addresses: Local machine (attacker, localhost): 10.0.0.1 Target machine (victim, Getting started box): 10.0.0.2 Th...
Nibbles In this article we are going to assume the following IP addresses: Local machine (attacker, localhost): 10.0.0.1 Target machine (victim, Nibbles box): 10.0.0.2 As this is a ret...