top of page
STENGE
uWhwHmca3RyT0nrkPjfRm++X5+/HFfpSkqThX+8ft2E=
Search
Sanitizing Text
🔍 The Hidden Side of Text: Detecting and Cleaning Invisible Characters We often assume that what we see is what we get — especially with...
Diniz Martins
May 8
13 views
0 comments
Metasploit: A Beginner-Friendly Guide
🔍 What is Metasploit? Metasploit is an open-source penetration testing framework developed by Rapid7. It helps security professionals...
Diniz Martins
May 7
14 views
0 comments
Fake Data in Python
If you are developing applications, testing your software, or just exploring Python's capabilities, you might have faced a situation...
Diniz Martins
Oct 10, 2024
59 views
0 comments
sLDAP: Configuration, Use Cases, and Troubleshooting
What is sLDAP? sLDAP (Secure Lightweight Directory Access Protocol) is a secure version of LDAP (Lightweight Directory Access Protocol)....
Diniz Martins
Oct 5, 2024
144 views
0 comments
Basic Configuration Guide for Huawei Firewalls
Introduction Huawei firewalls are powerful security devices used to control and secure network traffic. They are known for their...
Diniz Martins
Oct 2, 2024
100 views
0 comments
IPSec vs. TLS
When it comes to securing data over networks, IPSec (Internet Protocol Security) and TLS (Transport Layer Security) are two of the most...
Diniz Martins
Sep 6, 2024
56 views
0 comments
Understanding CIMC for Cisco ISE
Cisco Integrated Management Controller (CIMC) is a crucial component for managing and monitoring Cisco UCS servers, including those used...
Diniz Martins
Sep 5, 2024
81 views
0 comments
VyOS Basic Configuration
VyOS is an open-source network operating system that provides software-based network routing, firewall, and VPN services. It is designed...
Diniz Martins
Aug 27, 2024
76 views
0 comments
Cyrillic Alphabet
Exploring the Cyrillic Alphabet: A Beginner's Guide Have you ever come across the Cyrillic alphabet and wondered what it's all about?...
Diniz Martins
Apr 21, 2024
65 views
0 comments
bottom of page