Guide on hardening Proxmox management interface with 2FA, reverse proxy and Let’s Encrypt
Practical Binary Analysis book CTF writeups last level 8
Writeup for the last level of “Practical binary analysis” book CTF
Practical Binary Analysis book CTF writeups levels 5-7
Writeup for levels 5 to 7 of “Practical binary analysis” book CTF
Practical Binary Analysis book CTF writeups levels 2-4
Writeup for levels 2 to 4 of “Practical binary analysis” book CTF
Linux network statistics reference
Explanation of all the Linux network statistics exported by the kernel
Pass: using TOTP (time-based one-time) passwords
Use TOTP with the pass password manager
Ipdecap - release 0.7.2 out
New Ipdecap 0.7.2 version
Tarsnap: build your own Debian packages (i386, amd64, armel, armhf)
How to build a clean Debian package of Tarsnap from source for i386, amd64, armel, armhf architectures.
Linux network metrics: why you should use nstat instead of netstat
Why nstat is superior to netstat when it comes to Linux network metrics
Using Docker to build and run a bleeding-edge version of a software
How to use Docker to isolate the build of the latest version of a software