Matt KmetyinThe KickStarterBeginners Linux Guide: Navigating the Command LineAn introduction to the command line and 5 commands that will help you to become more comfortable using the command line in Linux.Jul 28, 2020Jul 28, 2020
Matt KmetyinInfoSec Write-upsBeginners CTF Guide: Finding Hidden Data in ImagesCommands and Tools to help you find hidden data in images while participating in Capture The Flag events.Jul 20, 20201Jul 20, 20201
Matt KmetyinThe KickStarterWireless Printing Using a Raspberry PiHow to turn your old printer into a network printer using Raspberry Pi as a print server.Jul 9, 2020Jul 9, 2020
Matt KmetyinThe KickStarterPhishing Emails — How Not to Get HookedHow malicious emails can infect your devices, compromise your privacy, and the best ways to avoid them.Jul 7, 2020Jul 7, 2020
Matt KmetyinBe Yourself5 Things I Wish I Knew When Starting My CareerSimple advice we all know but might not be following.Jul 5, 2020Jul 5, 2020
Matt KmetyinThe KickStarterHow to Block Malicious Ads using Pi-hole and a Raspberry PiBlock malicious advertisements, AKA malvertisements, using Pi-hole and a Raspberry Pi.Jul 3, 20201Jul 3, 20201
Matt KmetyinThe KickStarterSteganography on Kali Using SteghideHow to covertly hide data in images using Steghide on Kali Linux. Hint: There’s no hidden messages in the first image.Jun 30, 2020Jun 30, 2020
Matt KmetyinThe StartupInstalling DShield Honeypot on a Raspberry PiA lightweight honeypot that contributes threat intelligence data to SANS Internet Storm Center (ISC) for research purposes.Jun 29, 20201Jun 29, 20201
Matt KmetyWhat to do when your account has been compromised?How to deal with the sinking feeling that an attacker has accessed your account.Jun 27, 2020Jun 27, 2020
Matt KmetyBeginners Guide to Installing Raspberry Pi OS on a Raspberry PiRaspberry Pi OS is the official Operating System of the Raspberry Pi Foundation.Jun 26, 2020Jun 26, 2020