Tanmay Vaishtanmay-vaish.hashnode.net·Oct 19, 202113 Reasons Why You Should Use Linux!!People usually think: "If it so easy to run Windows, Why should I use Linux". Honestly writing, they are pretty much right about it too. There are lots and lots of features which Linux will always have a hard time providing to its users. But when it...Andres Leon Rangel and 9 others are discussing this10 people are discussing thisDiscuss·142 likes·2.8K readsLinuxOoohh 👀 nobody gave me the reason to install Linux but u do!🙂 thank you 18
Margo McCabemargomccabe.hashnode.net·Jun 16, 2021FeaturedHappy Hackathoning - Do’s & Don'tsWith the HarperDB + Hashnode Hackathon upon us this month, I thought it would be a good time to share some tips on getting the most out of your hackathon participation. There are tons of great articles and resources out there of folks sharing their e...Tapas Adhikary and 2 others are discussing this3 people are discussing thisDiscuss·128 likes·425 readshacking
Sahil Chandravanshisahilchandravanshi.hashnode.net·Mar 21, 2023Setting up the Hacking Environment: Installing Kali Linux on VirtualBoxThis guide demonstrates the easiest method for installing Kali Linux on Virtual Box on Windows and Linux. One of the greatest Linux distributions for those interested in security and hacking is Kali Linux. Although installing Kali Linux by replacing ...Discuss·113 likes·472 readsPentestinghacking
CyvisoryforCyvisory Blogcyvisory.hashnode.net·Apr 24, 2023How to secure Emails in 2023Every Day roughly 350 billion emails are send globally, which equals 44 emails per person on earth each day. Most people don't know that emails by default are sent unencrypted over the wire, leaving them vulnerable to interception as well as person ...Discusscyber
Abdulrahabdulrah4478.hashnode.net·Apr 24, 2023Artificial Intelligence in Cyb3r5ecur1tyIn recent years, cybersecurity threats have become a major concern for individuals, businesses, and governments worldwide. Cybercrimes have led to damages worth about $2 trillion so far. With the growing reliance on technology and the increasing soph...Discussai
Jordi Bassaganasprogramarivm.hashnode.net·Jul 26, 2021How to Create a WebSocket Server With TLS/SSLBack in the 2000s, there was no such thing as a free SSL certificate issued instantly online by a trusted certificate authority (CA). If you wanted one you had to pay for it and some of them used to be more expensive than they are today. By then webs...DiscussWeb Development
Taditadi.hashnode.net·Apr 22, 2023Anatomy of an APIProvider: Host of an API. Consumer: Person/Entity making the request. API Gateway: API management component that acts as an entry point to a web application. The gateway distributes the request to whichever microservice is needed. Can handle security...DiscussAPIsAPIs
rootforKnowledge Basehackerschoice-1665752223992.hashnode.net·Apr 21, 2023Tunnel via Cloudflare to any TCP ServiceCloudflare's cloudflared tunnels are commonly used to 'publish' a web server that runs behind a firewall (e.g. making the webserver accessible from the Internet). Cloudflare restricts the traffic to HTTP-style traffic: It won't allow the publishing o...Discuss·1.4K readshacking
Daciandacian.hashnode.net·Apr 19, 2023$28K Bounty - Admin Brick & Forced RevertAlchemist is a web3 community who developed the notable Fjord Foundry platform and a DeFi ecosystem composed of at least: Alchemist ERC20 - token $MIST Aludel - staking/rewards program Crucible - a vault/smart wallet for ERC20 tokens to subscribe ...Discuss·1 like·894 readsBug BountiesSmart Contracts
Barasa Jnr.barasajnr.hashnode.net·Apr 18, 2023The Journey of Self-Discovery: Navigating Software Engineering as a Newbie.Book Introduction: Entering the world of software engineering as a newbie can be both exciting and daunting. As you navigate through the maze of coding languages, software development processes, and technical jargon, it's easy to feel lost, overwhelm...Discusssoftware development
Kartik Mehtakartikmehta.hashnode.net·Apr 15, 2023Reverse Shell | Backdoor Implementation in PythonIntroduction A reverse shell is a type of shell in which the target machine initiates the connection to the attacker's machine. In other words, instead of the attacker connecting to the target machine, the target machine connects back to the attacker...Discuss·34 readsPython 3
Excel Emmanuelexcelemma.hashnode.net·Apr 14, 2023How Hacking Work And How To Prevent Being HackedComputer dangers are produced by people, not by computers. Computer predators prey on people for their own benefit. The threat to your security grows tremendously if you give a predator access to the Internet and your computer. Computer hackers are u...Discusshacking
Oliver Kipkemeiolivermengich.hashnode.net·Apr 14, 2023Docker Security Best PracticesDocker containers have been in use for a long time and many companies use docker to build and ship their solutions to production to maintain a unified version of their application and reduce breakdown and failure of their application in production en...DiscussDocker