Sometimes, during cyber security challenges or ethical hacking tasks, you may need to find the IP address of an inactive computer or one that has not been logged in.
Category: Tech Resources
24 of the best free alternatives to the most popular paid software
These free versions of paid software might be a little rough around the edges or not come with the full depth of features, but they will help you get your tasks done without spending more cash, which is a win.
Cybercriminals pose as “helpful” Stack Overflow users to push malware
This approach serves as a reminder of the constantly changing tactics of cybercriminals and, unfortunately, illustrates why you can never blindly trust what someone shares online.
You’re missing a lot if you haven’t used these 10 Google Docs templates
Whether you want to create a resume, invoice, software development proposal, or even a menu card for your new restaurant, the templates below should help you get a head start when struggling for inspiration when sitting at your laptop.
YouTube Becomes Latest Battlefront for Phishing, Deepfakes
YouTube has turned into a new front for malicious actors to deploy phishing, other malware, and bogus investment schemes, according to a report from researchers at security vendor Avast.
10 Essential CyberSecurity Cheat Sheets
This article contains links to 10 CyberSecurity Cheat Sheets that will aid you in your CyberSecurity Career.
Embedded Python: Build a Game on the BBC micro:bit – Real Python
https://realpython.com/embedded-python/
9 network commands every Linux admin should know – TechRepublic
https://www.techrepublic.com/article/9-network-commands-every-linux-admin-should-know/
3 essential Linux cheat sheets for productivity | Opensource.com
https://opensource.com/article/21/4/linux-cheat-sheets
SSH Tutorial for Beginners – How Does SSH Work
https://www.hostinger.com/tutorials/ssh-tutorial-how-does-ssh-work