Container technology – Part2

How to make container from scratch Prerequisite: https://pengs.win/container-technology/ If you want to learn behind the scene about containers you are in the right place. Firstly, you need to know your materials to create a container. Generally, users thought containers as lightweight virtual machines, but containers are isolated groups of processes running on a single host. That isolation can be creatable with underlying Technologies built into the Linux kernel: namespaces, cgroups, chroot, etc. “Everything is a File” in Linux. Before going into the syscalls you need to create a tiny file…

Hide Files Inside Images

Hiding in plain sight is sometimes the best tactic.   For instance, this lovely young lady   Rather unassuming, right? Well, read on and you’ll learn how to extract a hidden message from that picture!   Steganography is “the practice of concealing a file, message, image, or video within another file, message, image, or video.” (Source: Wikipedia) In Linux, the ever-so-handy Steghide allows us to do just that. I know that you and your imagination will come up with all sorts of creative ways to utilize this awesome little program.…

Freebitco.in allows you to mine bitcoins with your browser

mining bitcoins browser

Ever heard about mining bitcoin with browser? I don’t know if this has happened before anywhere, but Freebitco.in allows you now to mine Bitcoin with your browser. Sounds crazy, right? It uses your CPU to mine them so the income cannot be very big, but it’s still worth to try, why not? This was the result I got using my old Lenovo laptop (X220 with Intel i5 2520m). Just login to your Freebitco.in account, or register and try it yourself. It won’t make you rich but you may try it…

Best encrypted email providers | Only free ones | Security

best encrypted email providers

Hello everyone, today I will share you the best encrypted email providers. I will share only those which have free plans. I hope you enjoy! 1. Tutanota Tutanota is a great German made encrypted email provider. It works perfectly and also has Android and iOS apps available to download. I’ve used the android app for a few months now and can’t complain. Tutanota also offers paid business version. Tutanota automatically encrypts all your data on your device. Your mails as well as your contacts stay private. You can easily communicate…

Best websites to learn hacking | Penetration testing | Ethical

best websites to learn hacking

Hi guys, in this post, I’m willing to give you my list of best websites to learn hacking. Only the freemium ones. So let’s get started, I hope you enjoy! NOTE: ALL OUR TUTORIALS ARE ONLY MEANT FOR EDUCATIONAL PURPOSES. DO NOT BREAK THE LAW. Best websites to learn hacking 1. Hack This Site! This will be always be my personal favorite, it contains awesome challenges from easy to very hard. If you want to start using your brains, try it, it’s worth it. All you need is to do…

The Fact of Ransomware

Ransomware

This article addresses some brief explanation about Ransomware type malware, common prevention suggestions, and possible effective solutions. Ransomware is a special type of malware. The majority of Ransomware relies on some kind of social engineering such as luring the user of the system to perform some form of action. It could be anything from visiting a web page to executing programs that come as deceptive attachments in emails. The strategy is convincing the target that paying necessary fees a solution. Crypto ransomware is the version of Ransomware that encrypts as…

Tips on staying anonymous online – VPN | TOR | Security

Tips on staying anonymous online

On this post, you will learn some tips on staying anonymous online. Staying anonymous online has become a lot harder than we could imagine, your every step is being tracked and logged. Your personal data is been collected all the time by the big companies and governments. Well, here is some tips that can help you prevent that. Let me remind you that all our posts are only made for testing / educational purposes. Do not do anything illegal or you may end up in jail. You and only yourself,…

Clear recently accessed files in Linux Nautilus / GNOME File Manager

clear recently accessed files in linux

Hi, on this little guide, you will learn how to clear recently accessed files in Linux Nautilus. Nautilus is the file manager built for GNOME. There are a lot of reasons why you will need this command. Maybe you’re accessing sensitive data or maybe you don’t want your grandma to see your nasty little videos? Anyway, just fire up your terminal and write or copy paste the following command as root or using a sudoer. sudo rm ~/.local/share/recently-used.xbel And that is all you need to do for clearing that list.…

Create bootable USB on Linux terminal

create bootable usb on linux terminal

On this tutorial we will create bootable USB on Linux terminal. Distribution I will be using is Debian 9, but this method should work on almost any distro. Stick in your USB drive and make sure it has enough space to extract your .iso file whatever it is. I’m going to use debian.iso as example. Then you will need to find the path to your .iso file. In my case it’s /home/h/Downloads/debian.iso Then find your USB device path by executing the following command in your terminal as root or sudo…

Hiring authors, write for us, get paid in bitcoins!

Hello everyone! As you see in the post title, we are hiring authors! You can start writing for us if you fill the following terms. Requirements You’re interested in IT. Your english grammar is as good as mine or better. Computer Bitcoin address(You can make one for free at blockchain.info) You know how to use WordPress or willing to self-learn Working internet connection What you’re not required Any experience at all To even tell your personal information, just nickname and bitcoin address I think that’s about it. Sounds good right?…