Kali is a great learning tool for learning cybersecurity, especially the red-attacking side of it. For the longest time, I had trouble running the Kali VM on my rather old Thinkpad X1 Carbon, as the image consumes quite a few resources. There is a way to use most of Kali’s tools with little resource consumption:…… Continue reading SSH Connect to a Kali Virtual Machine in Virtualbox
Category: IT/Cybersec
IT and Cybersecurity related
Thinking About Computing Needs
After spending days trying to optimise my setup and thinking about the perfect use of my current hardware and also trying to get rid of stuff I don’t use, I came to the conclusion I need more hardware. This is kinda concerning, considering the initial problem I had before all this was that I have…… Continue reading Thinking About Computing Needs
CompTIA Security + Study Notes: Cryptography
Cryptography is as old as the desire of humans to communicate secretly. A famous example is that of the so-called Caesar cypher, named after Julius Caesar. He used to encrypt his correspondence by shifting the letters of the alphabet to the right or left an agreed-upon number of spaces. Cypher disc Image Credit: Cypher disc…… Continue reading CompTIA Security + Study Notes: Cryptography
Network + Study Notes: Open System Interconnection (OSI) Network Model
Computers have a very particular way of communicating with each other. For example, before widespread computer networks and the internet, people shared files by “sneakernet”: wearing a comfortable pair of sneakers and putting the info on the storage media and travelling to the destination computer to copy the data. This is not a very effective…… Continue reading Network + Study Notes: Open System Interconnection (OSI) Network Model