cyber security
-
Linux

Responder – Hack The Box // Walkthrough & Solution // Kali Linux
Responder is a free box available at the entry level of HackTheBox. Using Kali Linux, we introduce users to NTLM, enhancing their understanding of Local File Inclusion (LFI). NTLM, or Windows New Technology LAN Manager, is a set of security protocols developed by Microsoft. It authenticates user identities and safeguards the privacy and integrity of their activities. Fundamentally, NTLM functions…
Read More » -
VMware

🔴July 31’s Top Cyber News NOW! – Ep 676
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: Take control of your data and keep your private life private by signing up for DeleteMe. Go to and use promo code SIMPLYCYBER for 20% off. Check out John Strand’s Pay What You…
Read More » -
VMware

🔴July 30’s Top Cyber News NOW! – Ep 675
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: Take control of your data and keep your private life private by signing up for DeleteMe. Go to and use promo code SIMPLYCYBER for 20% off. Check out John Strand’s Pay What You…
Read More » 8 hours of C coding projects: Cyber Security
This is an 8 hour composite episode containing my best content with regards to Cyber Security. You will get an in-depth knowledge in writing encryption tools, connecting to the Tor privacy network, and how to write safe, un-hackable C code by making a safe string library. You will also learn the basics of Linux file system security and a whole…
Read More »How Does Virtualization Help Disaster Recovery? – SecurityFirstCorp.com
How Does Virtualization Help Disaster Recovery? Curious about how virtualization can revolutionize disaster recovery strategies? In this enlightening video, we delve into the pivotal role virtualization plays in bolstering organizations’ recovery capabilities. Discover how virtualization facilitates the creation of virtual server replicas, ensuring swift restoration in the face of disasters. By optimizing resource allocation and enabling seamless migration of virtual…
Read More »HOW TO FIX THE “zsh: corrupt history file /home/home/.zsh_history” ERROR IN KALI LINUX |Step-by-Step
Are you encountering the “zsh: corrupt history file /home/home/.zsh_history” error in Kali Linux? Don’t worry, you’re not alone! This error can be frustrating, but it’s easy to fix with the right steps. In this tutorial, I’ll guide you through the process of resolving the corrupt history file issue in Kali Linux. Whether you’re a beginner or an experienced user, you’ll…
Read More »


