nuux.hashnode.devYour Phone Number: The Unexpected Key Hackers Use to Unlock Your LifeWe rely on our mobile phones for almost everything – banking, email, social media, communicating with loved ones. We even trust them with our security, receiving those little text messages with codes (SMS 2FA) to prove it's really us logging in. But ...Apr 16, 2025·7 min read
nuux.hashnode.dev10 Ways to Copy Files from Server to Local: A DevOps GuideOkay, let's dive deep into the world of transferring files from a remote server to your local machine. As a DevOps engineer, this is a task you'll encounter frequently, and mastering various methods is crucial for efficiency and security. This articl...Dec 14, 2024·11 min read
nuux.hashnode.devWhat happens when you type google.com in your browser and press EnterWhen you type "https://www.google.com" in your browser and hit Enter, a fascinating journey begins to bring the Google search page to your screen. Here's what happens step by step in a way that's easy to understand: 1. Finding Google's Home (DNS Requ...Oct 15, 2023·3 min read
nuux.hashnode.devCracking a Program Password: My Experience with Ghidra and Reverse EngineeringI recently learned how to crack program passwords using different techniques and tools. Once, I used Ghidra to decompile the program and take a look at its code. Before we start Ghidra is a software reverse engineering suite of tools that was develop...May 8, 2023·2 min read