top of page
STENGE
uWhwHmca3RyT0nrkPjfRm++X5+/HFfpSkqThX+8ft2E=
Search
Notepad's Hidden Gem
Most people think of Notepad as just a simple text editor. You open it, type your notes, and close it. Nothing fancy, right? Well......
Diniz Martins
Jun 12
Sanitizing Text
The Hidden Side of Text: Detecting and Cleaning Invisible Characters We often assume that what we see is what we get — especially with...
Diniz Martins
May 8
Metasploit: A Beginner-Friendly Guide
What is Metasploit? Metasploit is an open-source penetration testing framework developed by Rapid7. It helps security professionals find,...
Diniz Martins
May 7
Fake Data in Python
If you are developing applications, testing your software, or just exploring Python's capabilities, you might have faced a situation...
Diniz Martins
Oct 10, 2024
sLDAP: Configuration, Use Cases, and Troubleshooting
What is sLDAP? sLDAP (Secure Lightweight Directory Access Protocol) is a secure version of LDAP (Lightweight Directory Access Protocol)....
Diniz Martins
Oct 5, 2024
Basic Configuration Guide for Huawei Firewalls
Introduction Huawei firewalls are powerful security devices used to control and secure network traffic. They are known for their...
Diniz Martins
Oct 2, 2024
IPSec vs. TLS
When it comes to securing data over networks, IPSec (Internet Protocol Security) and TLS (Transport Layer Security) are two of the most...
Diniz Martins
Sep 6, 2024
Understanding CIMC for Cisco ISE
Cisco Integrated Management Controller (CIMC) is a crucial component for managing and monitoring Cisco UCS servers, including those used...
Diniz Martins
Sep 5, 2024
VyOS Basic Configuration
VyOS is an open-source network operating system that provides software-based network routing, firewall, and VPN services. It is designed...
Diniz Martins
Aug 27, 2024
bottom of page