Join me in my exploration of IP security cameras! This guide should expose the reader to how a network device connects to your home network as well as how to detect it. To start, I acquired a DLink wireless IP camera just to mess around. DLink documentation for this device
Wining about IE8 on Linux... If you're anything like me, you've accumulated a lot of computer gadgets over the years, be it an old floppy drive deck for those 'just in case' moments, or the 256MB thumbdrive from that convention you forgot about. Maybe it's just me, but being a
Are you trying to deploy MFA on Linux machine but don't want every account to use it? Well here's an option for you using good ol' PAM! Firstly, I have long been a fan of Multi-factor authentication (MFA) since it is RELATIVELY easy for users to use while making password
I wrote 'tourniquet' as a simple exercise for securing a booted laptop from a snatch-n-grab scenario using over-the-counter hardware. When you plug a flash-drive into a computer, the USB drivers installed on your operating system go to work identifying that device and what it's supposed to do. On a Linux
Introduction Data breaches have been on the rise in the United States since 2005, from 157 million to a staggering 1.6 billion in 2017 (Clement, J). While not the highest ranking vector of attack, USB sticks have long been seen as threat for leaking information due to their high
Society needs privacy. Here's why.