Although Nagaraju was no longer connected with NCS, he discovered that his credentials remained valid, giving him remote access to the company’s servers.
Category: CyberPatriot
Find Virtual Machine IP Through Kali Linux – 3 Methods – GeeksforGeeks
Sometimes, during cyber security challenges or ethical hacking tasks, you may need to find the IP address of an inactive computer or one that has not been logged in.
Why Windows 11 is forcing everyone to use TPM chips – The Verge
https://www.theverge.com/2021/6/25/22550376/microsoft-windows-11-tpm-chips-requirement-security
7 Linux networking commands that every sysadmin should know | Enable Sysadmin
https://www.redhat.com/sysadmin/7-great-network-commands
3 essential Linux cheat sheets for productivity | Opensource.com
https://opensource.com/article/21/4/linux-cheat-sheets
Ex-NSA Hacker Explains how to get into Cyber Security
Interesting interview with an Ex-NSA Hacker. There is a lot of good information regarding degrees, certifications, CTFs, and Networking (for careers – not computers).https://www.youtube.com/watch?v=SFbV7sTSAlA
Getting started with Python – Pi My Life Up
https://pimylifeup.com/getting-started-with-python/
How to completely secure an Ubuntu server
https://dev.to/alejandroakbal/how-to-completely-secure-an-ubuntu-server-55i2