NCSC Excercise in a box launch
Online tool to help you judge your cyber resilience and provide training The tool is available on the NCSC website. It's available for free and helps an organisation practice in…
Online tool to help you judge your cyber resilience and provide training The tool is available on the NCSC website. It's available for free and helps an organisation practice in…
This is a WordPress Security mega-post containing a lot of best-practice information on securing, hardening, updating and maintaining a Wordpress site.Used by more than 60 million websites, including 30% of…
This tutorial will show you how to make a Raspberry Pi hack tool by installing Kali on the Raspberry Pi - by the end of this guide you will have…
Continuing on from my original metasploit beginners tutorial, here is a slightly more advanced Metasploit tutorial on how to use metasploit to scan for vulnerabilities. The outcome of this tutorial…
Interesting talk about the process of developing a blockchain app - talking about integrations with businesses legacy systems to enable the transition to the new platforms. A lot of companies…
Installing mariadb 10.2 mysql 5.7 in centos If you use the following method to install the latest mariadb, updates will be installed with the regular yum update commands! The first…
Automatic updates in kali (and other apt based distros). There are a ton of ways to do automatic updates in kali linux (though this will work on debian, ubuntu, proxmox…
Configuring free ssl certs with letsencrypt in centos Using letsencrypt in centos requires a few modifications to your centos before you can run the letsencrypt client. The setup for vhosts…
What is an sql injection attack? All websites process data entered by users. An input-validation attack is when unexpected user input is processed by a web server or database and…