Here are some sources to get you started! Thanks to @simonholdorf for the links! Linux Operating System – Crash Course for Beginners The Complete Linux Course Linux Command Line Full course Linux File System/Structure Explained! Linux for Ethical Hackers (Kali Linux Tutorial)
Category: Computers
What is in a Split Sheet
Song title Date the song was created Names of all involved parties and their role artists, songwriter, producer Publishing info for all involved. Ascap, emi, bmi etc. Contact information Name, Phone, Email, Address Signature of acceptance and the date. All parties get a signed letter. Tip :: I heard that these can also be Read More …
2022 Defcon Video Playlist
For those who do now know of Defcon, this is the Hacker conference that started them all. Just a quick post of the Video Playlist from this year’s conference. Sick Codes – Hacking the Farm = Breaking Badly into Agricultural Devices Aviv Sassoon -The Journey From Isolated Container to Cluster Admin Wietze Beukema – Save Read More …
Find an APT
MITRE Groups Thai CERT – Electronic Transactions Development Agency
Twitter Tips
You can upload your email list to Twitter for targeted advertising but you have to remember that you are handing the Information to Twitter as well. Your email list is no longer just yours. You can target users that have searched for specific keywords or you can exclude keywords as well. +music +studio -lessons
Hello from the Bedroom Rocker!
I just went ahead and ran the auto installer cause I am tired of procrastinating. I know I could do it manually, I just haven’t done it, and I don’t have a good reason for that. The Scriptaculous installer had given me a tone of problems with file permissions. Didn’t matter what theme I chose Read More …
Notes :: Getting around some Defenses
Trying to read up on this for some work things. Dropping a few links here. Will add more notes as I go on. —————————————————————— bypassing-cylance-and-other-avs-edrs-by-unhooking-windows-apis “”” It’s worth noting that not all the functions get hijacked by AVs/EDRs. Usually only those functions that are known to be abused over and over again in the wiled that Read More …