Articles

Container technology – Part2

How to make container from scratch Prerequisite: https://pengs.win/container-technology/ If you want to learn behind the scene about containers you are in the right place. Firstly, you need to know your materials to create a container. Generally, users thought containers as lightweight virtual machines, but containers are isolated groups of processes running on a single host. That isolation can be creatable with underlying Technologies built into the Linux kernel: namespaces, cgroups, chroot, etc. “Everything is a File” in Linux. Before going into the syscalls you need to create a tiny file…

Firefox Quantum Beta

Quick stats: it’s 2x faster than last year’s fox and uses 30% less RAM than Chrome     If you’re anything like me, you haven’t really been following the news on Mozilla. I’ve been far too busy hacking my way through The Odin Project, and sleeping 14 hours a day. I just use Firefox because it was the best alternative to Google Chrome, which I decided against because big brother and all that. Now, Firefox 57, which has been completely re-built from the ground up, is such an improvement over…

Hide Files Inside Images

Hiding in plain sight is sometimes the best tactic.   For instance, this lovely young lady   Rather unassuming, right? Well, read on and you’ll learn how to extract a hidden message from that picture!   Steganography is “the practice of concealing a file, message, image, or video within another file, message, image, or video.” (Source: Wikipedia) In Linux, the ever-so-handy Steghide allows us to do just that. I know that you and your imagination will come up with all sorts of creative ways to utilize this awesome little program.…

Cracking Passwords With Hashcat

Cracking Passwords With Hashcat

Hashcat is praised as one of the most advanced, thorough, and powerful password cracking programs available today. It’s also a personal favorite of mine, and we will be going over the basics so you can get started. By the end of this guide, you will attempt to crack as many passwords as you can from a list of many, many hashes created for this tutorial. When you’re done, post a comment below to tell us how many you got, and see how many passwords other people were able to find!…

Container technology – Part1

container technology

Outline; What is container (containers 101) How it works (Sample) This article can be seen as a start for people who are curious about how Container technology works and who want to develop it. I used Dockers container content in my article, that’s because I found it most presentable. What is container? Container technologies basically an approach to software development in which pieces of code are packaged in a standardized way. By this way, they can quickly be plugged in and run on the pre-defined operating system. Container, “A container…

Why you need to secure your Linux Servers

Do you need security for a linux server?

Whats the problem? In the current day and age anyone can build a Linux server. A Google search and a YouTube tutorial and suddenly you have a device that hosts a webpage. It is honestly amazing and it is wonderful to live in a time where anyone can learn about Linux and host a server within minutes. Do any of these tutorials tell you how to secure your server?   Very few of the tutorials I found  warned of the risk of not securing your device. Therefore I set out…

Freebitco.in allows you to mine bitcoins with your browser

mining bitcoins browser

Ever heard about mining bitcoin with browser? I don’t know if this has happened before anywhere, but Freebitco.in allows you now to mine Bitcoin with your browser. Sounds crazy, right? It uses your CPU to mine them so the income cannot be very big, but it’s still worth to try, why not? This was the result I got using my old Lenovo laptop (X220 with Intel i5 2520m). Just login to your Freebitco.in account, or register and try it yourself. It won’t make you rich but you may try it…

Best encrypted email providers | Only free ones | Security

best encrypted email providers

Hello everyone, today I will share you the best encrypted email providers. I will share only those which have free plans. I hope you enjoy! 1. Tutanota Tutanota is a great German made encrypted email provider. It works perfectly and also has Android and iOS apps available to download. I’ve used the android app for a few months now and can’t complain. Tutanota also offers paid business version. Tutanota automatically encrypts all your data on your device. Your mails as well as your contacts stay private. You can easily communicate…

Best websites to learn hacking | Penetration testing | Ethical

best websites to learn hacking

Hi guys, in this post, I’m willing to give you my list of best websites to learn hacking. Only the freemium ones. So let’s get started, I hope you enjoy! NOTE: ALL OUR TUTORIALS ARE ONLY MEANT FOR EDUCATIONAL PURPOSES. DO NOT BREAK THE LAW. Best websites to learn hacking 1. Hack This Site! This will be always be my personal favorite, it contains awesome challenges from easy to very hard. If you want to start using your brains, try it, it’s worth it. All you need is to do…

The Fact of Ransomware

Ransomware

This article addresses some brief explanation about Ransomware type malware, common prevention suggestions, and possible effective solutions. Ransomware is a special type of malware. The majority of Ransomware relies on some kind of social engineering such as luring the user of the system to perform some form of action. It could be anything from visiting a web page to executing programs that come as deceptive attachments in emails. The strategy is convincing the target that paying necessary fees a solution. Crypto ransomware is the version of Ransomware that encrypts as…