Basic Hardening of a Ubuntu DigitalOcean Droplet
Just the basics of hardening after deploying a Ubuntu droplet via DigitalOcean - Blog by SH3LL
Browse through all the posts from the most recent to the oldest and enjoy all the content.
Just the basics of hardening after deploying a Ubuntu droplet via DigitalOcean - Blog by SH3LL
Quick reference guide on creating a new sudo user - Blog by SH3LL
Recommended directories, files, and permissions for each user's SSH config - Blog by SH3LL
Recommended steps for generating a modern, secure, and widely supported public/private key pair using ECDSA
Our first dive into docker, challenges and lessons learned, a full guide on infophreak's CTFd infrastructure. - Blog by SH3LL
IT Outages in Netherlands, PoorTry Windows Driver Evolves, Iran-Sponsored Threat Actor Engages in Intelligence Operations on US & UAE targets, FlyCASS Vulnerability Risks Security Bypass, NK Threat Actors Exploit Chrome Zero-Day, GitHub Comments Distributing Malware, Cicada3301 Targets ESXi Systems
This blog aims to provide a clear and comprehensive understanding of threat intelligence and threat hunting, their differences and how they work together.
The US Department of State & US Secret Service Have Issued a Reward of Up to $2.5 Million for Information Leading to the Arrest of Volodymyr Kadariya in Any Country
TIS-100 is an open-ended programming game by Zachtronics, the creators of SpaceChem and Infinifactory, in which you rewrite corrupted code segments to repair the TIS-100 and unlock its secrets. It’s the assembly language programming game you never asked for!
A thorough walkthrough/writeup of ConvertMyVideo on TryHackMe.