Build out of “Da Rig” – 2 Level Crypto Mining Rig – Part 1
So I am expanding my curiosity, investment, and mining capabilities in building a new 2-level Crypto Mining Rig. The intention eventually will be to fill it with 16 AMD Radeon…
Cyber Security with a flare
So I am expanding my curiosity, investment, and mining capabilities in building a new 2-level Crypto Mining Rig. The intention eventually will be to fill it with 16 AMD Radeon…
In 2019, Google Cloud calculated pi — the irrational number discovered thousands of years ago — out to 31.4 trillion digits. That was a world record. But then, in 2021,…
1. Reconnaissance 2. Popping a reverse shell !!! 2.1. Making the connection 3. Reading user flag 4. Privilege Escalation 4.1. Hunting for SUID binaries 4.2. Getting root shell and reading…
Just a few random Raspberry Pi Crypto Mining photos
Since the Middle Ages, families have been honoring their paternal bonds with well wishes, lavish gifts, and family gatherings. This year marks the 110th anniversary when Sonora Smart Dodd founded…
Bitcoin (BTC) is the first cryptocurrency, and it’s also the best-known of the more than 19,000 cryptocurrencies today. Financial media eagerly covers each new dramatic high and stomach-churning decline, making…
In a recent Microsoft advisory, the company warned that the operators of BlackCat ransomware (aka ALPHV) is using exploits to gain access to target networks by exploiting unpatched Exchange server…
The crypto market’s slide has continued, with Bitcoin and Ethereum recording new 52-week lows every day this week. Bitcoin continued its slide overnight, with the leading cryptocurrency by market cap…
Introduction Sudo is SuperUser DO and is used to access restricted files and operations. By default, Linux restricts access to certain system parts, preventing sensitive files from being compromised. The…
Log files are an essential part of Linux system administration and monitoring. But log files also quickly grow and take up a lot of storage space. The good news is…