Sharon·10 hours agoSetting up a OPSEC with Raspberry Pi 4Greetings! In this tutorial, I will guide you on setting up an effective operational security (opsec) for your Raspberry Pi device that can run continuously for 24/7. By following the steps outlined in this guide, you will be able to ensure that your device remains secure and protected against any…Windows7 min readWindows7 min read
glizzykingdreko·17 hours agoOpen a Port on Windows Firewall with a Simple PowerShell ScriptIn my previous article, I showed you how to automate your Windows server setup with a custom PowerShell script. In this article, I’ll demonstrate how to open a specific port on Windows Firewall using a simple PowerShell script. …Windows3 min readWindows3 min read
xeladuinLevel Up Coding·1 day agoMember-onlyAre you using the Windows snipping Tool? Stop it immediately!Cropped image parts can be restored. This might leak sensitive data. Here is how it works and how you can protect yourself! — If you use Windows 10 or 11, you might be familiar with the Snipping Tool app that lets you take and edit screenshots easily. However, did you know that this app has a serious security flaw that could expose your sensitive information to hackers?Windows3 min readWindows3 min read
Marcus Spencer·1 day agoBrowser Wars | Microsoft EdgeInternet Explorer’s successor has reemerged to reclaim the crown. Internet browsers are incredibly important because we need them to browse the fucking internet. The problem is that people use the same browser for 10 years without realizing the competition took over 8 years prior. So yup, you’ve been using the…Windows5 min readWindows5 min read
Prajwal_naik·1 day agoWindows Commands you NEED to knowcd: This command is used to change the current directory. For example, “cd Documents” will take you to the Documents folder. dir: This command is used to display the contents of a directory. mkdir: This command is used to create a new directory. ren: This command is used to rename…Windows2 min readWindows2 min read
ibrahim atasoy·1 day agoWhat is John the RipperWhat is John The Ripper (JTR)? Hello. The tool I will discuss in this article is a powerful brute force / password crack tool called John The Ripper (JTR), which comes pre-installed on Kali Linux. John The Ripper Password Cracking tool also works on Windows and macOS systems. It is a…Windows4 min readWindows4 min read
remsec·2 days agoCreating an Active Directory Hacking Lab (Part 1 — Network and Domain Controller)Internal penetration testing is one of the core testing types that should be in all pentesters arsenal. Now, unless you are actively preforming these tests, getting your hands on an Active Directory domain to test isn’t the easiest thing to do. Of course there are Hack the Box and Try…Windows10 min readWindows10 min read
Daniel Easterman·1 day agoMember-onlyStep-by-step guide for Windows Users: Manage your Python projects with pyenv-win.What is Pyenv? Install and manage multiple Python versions on your computer. This makes it easier to share your code with others, deploy your code and generally avoid all those annoying table-flipping moments! Open a new PowerShell window, and make sure you select the “Run as Administrator” option:Windows2 min readWindows2 min read
Dženan Džafić·2 days agoTake Control of Your WSL Resources for Smooth DevelopmentWhen WSL (Windows Subsystem for Linux) was first introduced to the scene I was so excited to use it because it marked a big leap forward in building out the Windows Developer Experience and as the second revision of it hit the PCs it introduced big performance improvements and it…Windows4 min readWindows4 min read
Hongbo Liu·1 day agoMember-onlyEssential Windows 10 Keyboard Shortcuts for Software Developers: Boost Your ProductivityMaximize Productivity with These Essential Windows 10 Keyboard Shortcuts As a software developer, maximizing productivity is crucial to getting things done quickly and efficiently. One way to do this is by using keyboard shortcuts on Windows 10. …Windows8 min readWindows8 min read