Kali is a great learning tool for learning cybersecurity, especially the red-attacking side of it. For the longest time, I had trouble running the Kali VM on my rather old Thinkpad X1 Carbon, as the image consumes quite a few resources. There is a way to use most of Kali’s tools with little resource consumption:…… Continue reading SSH Connect to a Kali Virtual Machine in Virtualbox
Author: Remus Sferle
Make Debian 12 Pretty and Useful
There are a few customisations I have come to love on the personal Debian install. This blog post is meant to describe the steps for my ideal (at this point) Debian 12 post-installation cleanup and provide a few security applications for everyday use and a few programs for light security work. Download and Install Debian…… Continue reading Make Debian 12 Pretty and Useful
Thinking About Computing Needs
After spending days trying to optimise my setup and thinking about the perfect use of my current hardware and also trying to get rid of stuff I don’t use, I came to the conclusion I need more hardware. This is kinda concerning, considering the initial problem I had before all this was that I have…… Continue reading Thinking About Computing Needs
Raspberry Pi NAS with Open Media Vault and Plex
Ingredients: Raspberry pi 4 – I used one with 8Gb of RAM with whatever case is available1 or 2 external hard disk drives (HDDs) – if 2 are used, a powered USB hub is required, as the pi does not provide enough power for more than 1 HDDof note also, no RAID configurations are possible…… Continue reading Raspberry Pi NAS with Open Media Vault and Plex
Xubuntu with AwesomeWM
After some looking about and being sick of running Windows 10 just for doing some Scratch-like programming for uni, I have decided to update my system to full a Linux pc with, if needed Win10 and Kali VMs for all my HackTheBox and TryHackMe needs. Because I still don’t have proper internet and using phone…… Continue reading Xubuntu with AwesomeWM
CompTIA Security + Study Notes: Cryptography
Cryptography is as old as the desire of humans to communicate secretly. A famous example is that of the so-called Caesar cypher, named after Julius Caesar. He used to encrypt his correspondence by shifting the letters of the alphabet to the right or left an agreed-upon number of spaces. Cypher disc Image Credit: Cypher disc…… Continue reading CompTIA Security + Study Notes: Cryptography
Network + Study Notes: Open System Interconnection (OSI) Network Model
Computers have a very particular way of communicating with each other. For example, before widespread computer networks and the internet, people shared files by “sneakernet”: wearing a comfortable pair of sneakers and putting the info on the storage media and travelling to the destination computer to copy the data. This is not a very effective…… Continue reading Network + Study Notes: Open System Interconnection (OSI) Network Model
Tweaks on Home Computer (Mostly GNU/Linux)
I have some peculiarities for my desktop setup that I use every time I reinstall a new OS. So instead of researching how to do the setup all over every time I reinstall an OS, dual boot, or distro hop, I will throw them all in a blog post and save some keystrokes and a…… Continue reading Tweaks on Home Computer (Mostly GNU/Linux)
Ad-Free Network with Pi-hole
This is a tutorial for installing Pi-hole on your home network. As the devs on the pi-hole.net put it, it is a “network-wide ad blocking” solution. The app acts as a DNS (domain name system) server. More info on this wiki. It basically sends ad queries that you generate when you visit a website to…… Continue reading Ad-Free Network with Pi-hole
Finished High School Maths
It has been a long time coming. I have delayed it and procrastinate around it for a few months, but I finally finished it with 100% completion. The journey for me started on the 12th of May 2020 and finished yesterday, the 7th May 2021. Sal and his team truly deserve the most generous praise…… Continue reading Finished High School Maths