top of page
STENGE
uWhwHmca3RyT0nrkPjfRm++X5+/HFfpSkqThX+8ft2E=
Search
Notepad's Hidden Gem
Most people think of Notepad as just a simple text editor. You open it, type your notes, and close it. Nothing fancy, right? Well......
Diniz Martins
Jun 12
13 views
0 comments
Sanitizing Text
The Hidden Side of Text: Detecting and Cleaning Invisible Characters We often assume that what we see is what we get — especially with...
Diniz Martins
May 8
23 views
0 comments
Metasploit: A Beginner-Friendly Guide
What is Metasploit? Metasploit is an open-source penetration testing framework developed by Rapid7. It helps security professionals find,...
Diniz Martins
May 7
16 views
0 comments
Fake Data in Python
If you are developing applications, testing your software, or just exploring Python's capabilities, you might have faced a situation...
Diniz Martins
Oct 10, 2024
61 views
0 comments
sLDAP: Configuration, Use Cases, and Troubleshooting
What is sLDAP? sLDAP (Secure Lightweight Directory Access Protocol) is a secure version of LDAP (Lightweight Directory Access Protocol)....
Diniz Martins
Oct 5, 2024
177 views
0 comments
Basic Configuration Guide for Huawei Firewalls
Introduction Huawei firewalls are powerful security devices used to control and secure network traffic. They are known for their...
Diniz Martins
Oct 2, 2024
124 views
0 comments
IPSec vs. TLS
When it comes to securing data over networks, IPSec (Internet Protocol Security) and TLS (Transport Layer Security) are two of the most...
Diniz Martins
Sep 6, 2024
67 views
0 comments
Understanding CIMC for Cisco ISE
Cisco Integrated Management Controller (CIMC) is a crucial component for managing and monitoring Cisco UCS servers, including those used...
Diniz Martins
Sep 5, 2024
99 views
0 comments
VyOS Basic Configuration
VyOS is an open-source network operating system that provides software-based network routing, firewall, and VPN services. It is designed...
Diniz Martins
Aug 27, 2024
90 views
0 comments
bottom of page