A Comfy Corner for Software, Security, Cloud, and AI
Securing enterprise linux in less than a minute
How an attacker would crack a login, and how to protect against it
Finding malicious files the open source way
Regain control of your windows 7/8/10/11 pc with just a few commands
Exploring the vulnerabilities in a demo application
A quick guide to crack password-protected zip (and other) archive files with john the ripper and a wordlist
Learn to make a hacker's life harder