Security Recon to Root
Learn about the hacker methodology. See how Pentester Jarrod Rizor goes about doing an external pentest from recon to enumeration to exploitation using various linux tools and techniques. Live Demo of exploiting a linux box and cracking WPA2 PSK. read more
Terminal Based Development
Shaun McFee presented how to create an effective terminal based development environment using tmux and related tools. read more
2022-03-31 - Linux and Android
2022-02-24 - What's on G's mind?
2022-01-27 - Getting Started with Proxmox VE