A Comfy Corner for Software, Security, Cloud, and AI
But you should use them anyway
When even linux system utilities lie to you
Understanding what information attackers are looking for
Securing enterprise linux in less than a minute
How an attacker would crack a login, and how to protect against it
Finding malicious files the open source way
Regain control of your windows 7/8/10/11 pc with just a few commands
Exploring the vulnerabilities in a demo application
A quick guide to crack password-protected zip (and other) archive files with john the ripper and a wordlist
Learn to make a hacker's life harder