Cuatro y 2A closer look at the IMEI and its importanceThe easiest way to change it on a dumbphone and an explanation of structure.Jul 2, 2023Jul 2, 2023
Cuatro y 2Hacking a Linux user: The hash strategyThe impact of not encrypting your disk. (5)Jun 29, 2023Jun 29, 2023
Cuatro y 2Exploring the basics of hash functions and how to create them (4)A hash is an algorithm that takes as input a message of arbitrary length and produces an output of fixed length. The result is called a…Jun 24, 2023Jun 24, 2023
Cuatro y 2A Firefox guide to invisibilityRemember to cover your tracks. 😉 (3)Jun 22, 2023Jun 22, 2023
Cuatro y 2YubiKey setup GPG and SSH. The way to be secure.Exporting your GPG and SSH keys. (2)Jun 18, 2023Jun 18, 2023
Cuatro y 21. GPG — Our privacy saverGnuPG stands for GNU Privacy Guard, is a tool that can be used to encrypt and sign files completing the CIA triad: confidentiality…Jun 16, 2023Jun 16, 2023
Cuatro y 2Arch Linux and software customization in 10 minutesInstallation script for custom Arch and software configuration.Jan 11, 20231Jan 11, 20231