A Comfy Corner for Software, Security, Cloud, and AI
Hiding important services from unauthorized eyes
Reliable backups from storage to recovery
Finding accidentally exposed files
Preventing privilege escalation through privileged commands
How security professionals evaluate a website
Adding more metadata to images
Keeping track of changes made by intruders
From memory leaks to race conditions
Understand and detect post-exploitation changes
How misconfigurations lead to privilege escalation