Mastering PowerShell Scripting – Fifth Edition: Automate repetitive tasks and simplify complex administrative tasks using PowerShell by Chris Dent is an outstanding resource tailored for IT professionals, system administrators, and developers aiming to maximize the potential of PowerShell scripting. This updated edition offers a thorough exploration of the latest advancements in PowerShell, providing a deep…
Tag: Hacker
Interview with Hacker, Programmer and Former Armoured Recon Patrol Commander Leigh Trinity
Today, I have the privilege of sitting down with a remarkable individual who I have been friends with for a while now, a former armored recon patrol commander, she has traded the battlefield for the digital frontier, wielding her skills in C# and Python to fortify systems against potential threats. But that’s not all—beyond the…
Cybersecurity, Threats, Malware Trends & Strategies by Tim Rains 2nd Edition REVIEW
In the ever-changing landscape of cyber threats, malware, and data protection, Tim Rains’ book Cybersecurity, Threats, Malware Trends & Strategies provides an invaluable look into the current and future state of cyber security. With a wealth of knowledge and insights garnered from his time as a director at Microsoft’s Cybersecurity Solutions Group, Rains is able…
Practical Linux Forensics, A Guide for Digital Investigators by Bruce Nikkel for No Starch Press REVIEW
This book is a comprehensive and informative guide for those interested in digital forensics and investigations. The book covers a wide range of topics related to forensic analysis of Linux systems, including data acquisition, evidence preservation, and various forensic techniques. It is a fantastic read, even before going deep into it forensically, the digital and…
[DFIR TOOLS] Hasher, what is it & how to use!
Following on from the previous [DFIR TOOLS] posts. Hasher is a software application developed by Eric Zimmerman that is used to calculate and compare the hash values of files. A hash value is a unique code that is generated based on the contents of a file. By comparing the hash values of two files, it…
Cybersecurity-Attacks and Defenses Strategies 3rd Edition by Yuri Diogenes & Dr Erdal Ozkaya REVIEW
This book is a little different to the ones I have been reading recently in that it is more general in a sense that it covers the whole cybersecurity umbrella regarding red and blue teaming and the like. It’s nice every now and then to just read book like this every now and then over…
Network Basics for Hackers by Occupy the Web REVIEW!
Today I get to review another book from Occupy the Web who I am a big fan of, his books are fantastic, and I have every one that has been released so far, so when this book `Networking for Hackers` was getting released it was a total no brainer in working through it. It couldn’t…
Interview With 0 Day Clothing
Before starting this post I want to state this is not an ad or promotion or anything like that it is me who reached out the 0 Day for an interview as I am genuinely a fan of their clothes. There tops have appeared in my favourite show (and probably your favourite too) Mr Robot….
HACKTORIA: The Killer Clown – Walkthrough
Back with another Hacktoria walkthrough, easing myself in by working through all the easy ones first and this time it is ‘The Killer Clown‘. Ok, so I won’t try to over think this like I did on the lost at see when i tried to crack the password using the RockYou.txt lol. So the image…
HACKTORIA: Lost at Sea – Walkthrough
Hello People, I have decided to do something a little different to my usual posts of interviews, book and course reviews and stuff like that to do some walkthroughs for both Hacktoria and Over the Wire. I started to do the OVW ages ago and got to busy to really put any time into it…