A Comfy Corner for Software, Security, Cloud, and AI
From memory leaks to race conditions
Understand and detect post-exploitation changes
How misconfigurations lead to privilege escalation
But you should use them anyway
When even linux system utilities lie to you
Understanding what information attackers are looking for
Securing enterprise linux in less than a minute
How an attacker would crack a login, and how to protect against it
Finding malicious files the open source way
Regain control of your windows 7/8/10/11 pc with just a few commands