Jonas Satkauskascyberjourney.eu·Jan 21, 2025The Importance of Network Knowledge for HackersIntro Hacker is going to work with different cases. Most of those cases will include some kind of a network. I think that it is really important to understand what makes the network and how’s its made. To exploit, we need to understand where to put t...1 likeLinux
Rehan ShaikhforBreachForcebreachforce.net·Jan 7, 2025How to break into Cyber SecurityHello, I am Rehan Shaikh, a Cyber Security Consultant at TCS. I also volunteer with a local cybersecurity meetup group called BreachForce. I recently graduated from college and secured my job at TCS as a fresher. It might sound unbelievable, but it's...1 likeindian job market
Sriker Paturisecuritysaturdays.hashnode.dev·Jan 4, 2025The Invisible Web: How Everyday Devices Share SecretsHey there, cyber explorers! Welcome to the debut technical post of Security Saturdays with Sriker! Imagine a world where you can send a message, stream your favorite movie, or order a hot pizza with just a few taps—without ever stopping to think abou...2 likesGeneral Programming
Birendra Kumar Chaudharybiren.hashnode.dev·Jan 4, 2025🌀How to install and configure kali Linux in VMware Workstation pro.✅Kali Linux is a Debian-based OS designed for penetration testing, ethical hacking, and cybersecurity. It comes with pre-installed tools like Metasploit, Nmap, and Wireshark for tasks like vulnerability assessment, network monitoring, and digital fore...Kali Linux
danielsubnetting-demystified.hashnode.dev·Jan 2, 2025Understanding Subnetting: Key Concepts and Real-World ImportancePrerequisites The goal of this article is to give you a clear understanding of what subnetting is, its importance, and a real-world example of subnetting in action. To fully grasp the concepts in this article, you need a good understanding of what an...2 likesSystem administration
geethu vijayangeethuv.hashnode.dev·Dec 30, 2024The Future of Cybersecurity: Trends and Innovations to WatchAs technology evolves at an unprecedented pace, cybersecurity remains a critical challenge for organizations worldwide. The rapid digital transformation and the growing sophistication of cyber threats demand a proactive and innovative approach to saf...cyber security
Brian Kingsolodev.app·Dec 11, 2024SSH Setup for Ubuntu 24.04 LTS.TL;DR. SSH Setup for Ubuntu 24.04 LTS involves installing and configuring OpenSSH Server on the remote server, generating an RSA key pair on the local system, and uploading the local, public key to the remote system for secure, password-less authenti...The Ops SeriesUbuntu 24.04
Weskillweskill.hashnode.dev·Dec 8, 2024Cyber Security and Its Importance in Today's WorldIn the rapidly advancing digital age, cyber security has emerged as one of the most critical concerns for businesses, governments, and individuals alike. As technology evolves, so do the threats targeting our online environments. From personal data b...cyber security
Brian Kingsolodev.app·Dec 8, 2024Security and Hardening for Ubuntu 24.04 LTS.TL;DR. This post provides a comprehensive guide to securing and hardening an Ubuntu 24.04 LTS system. It covers essential steps such as updating the system, configuring unattended upgrades, setting up a firewall with UFW, installing Fail2Ban to preve...139 readsThe Ops SeriesUbuntu Security
Opara Blessingoparablessing.hashnode.dev·Nov 27, 2024Top 10 Cybersecurity Best Practices to Protect Yourself in the Digital AgeIntroduction: In today’s digital world, cybersecurity is more critical than ever. With the rise of cyber threats like hacking, identity theft, and data breaches, protecting your online presence is no longer optional it’s a necessity. From individuals...#cybersecurity